US5014192A - System for locating a file in a logical ring by sequentially forwarding access request with file system name and file name - Google Patents

System for locating a file in a logical ring by sequentially forwarding access request with file system name and file name Download PDF

Info

Publication number
US5014192A
US5014192A US07/300,687 US30068789A US5014192A US 5014192 A US5014192 A US 5014192A US 30068789 A US30068789 A US 30068789A US 5014192 A US5014192 A US 5014192A
Authority
US
United States
Prior art keywords
file
access request
file system
name
generating
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
US07/300,687
Inventor
Bruce M. Mansfield
Frank C. Kolnick
Andrew I. Kun
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Motorola Solutions Inc
Original Assignee
Motorola Computer X Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Motorola Computer X Inc filed Critical Motorola Computer X Inc
Priority to US07/300,687 priority Critical patent/US5014192A/en
Assigned to MOTOROLA INC. reassignment MOTOROLA INC. ASSIGNMENT OF ASSIGNORS INTEREST. Assignors: MOTOROLA COMPUTER X, INC.
Application granted granted Critical
Publication of US5014192A publication Critical patent/US5014192A/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F15/00Digital computers in general; Data processing equipment in general
    • G06F15/16Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
    • G06F15/163Interprocessor communication
    • G06F15/173Interprocessor communication using an interconnection network, e.g. matrix, shuffle, pyramid, star, snowflake
    • G06F15/17337Direct connection machines, e.g. completely connected computers, point to point communication networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/14Details of searching files based on file metadata
    • G06F16/148File search processing
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99931Database or file accessing
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99931Database or file accessing
    • Y10S707/99939Privileged access

Definitions

  • This invention relates generally to digital data processing, and, in particular, to a data management system comprising a plurality of file systems coupled in a logical ring.
  • the present invention concerns a distributed data processing system--that is, two or more data processing systems which are capable of functioning independently but which are so coupled as to send and receive messages to and from one another.
  • a Local Area Network is an example of a distributed data processing system.
  • a typical LAN comprises a number of autonomous data processing "cells", each comprising at least a processor and memory. Each cell is capable of conducting data processing operations independently.
  • each cell is coupled (by appropriate means such as a twisted wire pair, coaxial cable, fiber optic cable, etc.) to a network of other cells which may be, for example, a loop, star, tree, etc., depending upon the design considerations.
  • the present invention finds utility in such a distributed data processing system, since there is a need in such a system for the processes which are executing or to be executed in the individual cells to share data and to communicate data among themselves.
  • a file system is a way of logically organizing data, and it may comprise one or more physical data storage devices.
  • a file system comprises an organized arrangement of data and a file index identifying the data, its location, and perhaps other characteristics.
  • any of the individual cells of a LAN may contain one or more file systems. Certain file systems may be unique, while other file systems may be copies in order to provide a degree of redundancy.
  • Data access transparency is defined herein to mean that any file can be accessed by any process located anywhere in the distributed data processing system.
  • Data residence transparency is defined herein to mean that any file can be accessed wherever it may reside, even if it has been physically moved within the system.
  • a data management system for use in a data processing system, the data management system comprising a plurality of individual file systems, means for coupling the file systems together, means for generating an access request to one of the file systems, and means for attempting to satisfy the access request by accessing successive file systems until either the access request is satisfied or until all of the file systems have been accessed.
  • FIG. 1 shows a representational illustration of a single network, distributed data processing system incorporating the improved data management system of the present invention.
  • FIG. 2 shows a block diagram illustrating a multiple-network, distributed data processing system incorporating the improved data management system of the present invention.
  • FIG. 3 shows an architectural model of a data processing system incorporating the present invention.
  • FIG. 4 shows the relationship between software contexts and processes as they relate to the present invention.
  • FIG. 5 shows the relationship between external events and processes.
  • FIG. 6 shows how messages may be sent between processes within nested contexts.
  • FIG. 7 shows an architectural model of the improved data management system incorporating the present invention.
  • FIG. 8 shows an architectural software model of the improved data management system incorporating the present invention.
  • FIG. 9 shows the relationship between pictures, views, and windows in the human interface of a data processing system incorporating the present invention.
  • FIG. 10 shows a conceptual view of the different levels of human interface within a data processing system incorporating the present invention.
  • FIG. 11 shows a block diagram of a logical ring of file systems, illustrating how an access request to a file system is handled by the present invention.
  • FIG. 12 shows a flow diagram illustrating the operation of the improved data management system of the present invention.
  • a distributed computer configuration comprising multiple cells 2-7 (nodes) loosely coupled by a local area network (LAN) 1.
  • LAN local area network
  • Each cell comprises at least a processor and memory, as will be discussed in greater detail with reference to FIG. 2 below.
  • each cell may also include other units, such as a printer 8, operator display module (ODM) 9, mass memory module 13, and other I/O device 10.
  • ODM operator display module
  • a first local area network LAN 1 comprises several cells 2, 4, and 7.
  • LAN 1 is coupled to a second local area network LAN 2 by means of an Intelligent Communications Module (ICM) 50.
  • the Intelligent Communications Module provides a link between the LAN and other networks and/or remote processors (such as programmable controllers).
  • LAN 2 may comprise several cells (not shown) and may operate under the same LAN protocol as that of the present invention, or it may operate under any of several commercially available protocols, such as Ethernet; MAP, the Manufacturing Automation Protocol of General Motors Corp.; Systems Network Architecture (SNA) of International Business Machines, Inc.; SECS-II; etc.
  • Each ICM 50 is programmable for carrying out one of the above-mentioned specific protocols.
  • the basic processing module of the cell itself can be used as an intelligent peripheral controller (IPC) for specialized devices.
  • IPC intelligent peripheral controller
  • LAN 1 is additionally coupled to a third local area network LAN 3 via ICM 52.
  • a process controller 55 is also coupled to LAN 1 via ICM 54.
  • a representative cell N (7, FIG. 2) comprises a processor 24 which, in a preferred embodiment, is a Motorola 68010 processor. Each cell further includes a read only memory (ROM) 28 and a random access memory (RAM) 26. In addition, each cell includes a Network Interface Module (NIM) 21, which connects the cell to the LAN, and a Bus Interface 29, which couples the cell to additional devices within a cell. While a minimal cell is capable of supporting two peripheral devices, such as an Operator Display Module (ODM) 41 and an I/O Module 44, additional devices (including additional processors, such as processor 27) can be provided within a cell. Other additional devices may comprise, for example, a printer 42, and a mass-storage module 43 which supports a hard disk and a back-up device (floppy disk or streaming tape drive).
  • ODM Operator Display Module
  • I/O Module 44 additional devices (including additional processors, such as processor 27) can be provided within a cell.
  • Other additional devices may comprise, for example, a printer 42, and a mass-stor
  • the Operator Display Module 41 provides a keyboard and screen to enable an operator to input information and receive visual information.
  • While a single cell may comprise all of the above units, in the typical user application individual cells will normally be dedicated to specialized functions. For example, one or more mass storage cells may be set up to function as data base servers. There may also be several operator consoles and at least one cell for generating hard-copy printed output. Either these same cells, or separate dedicated cells, may execute particular application programs.
  • the system is particularly designed to provide an integrated solution for factory automation, data acquisition, and other real-time applications. As such, it includes a full complement of services, such as a graphical output, windows, menus, icons, dynamic displays, electronic mail, event recording, and file management.
  • Software development features include compilers, a window-oriented editor, a debugger, and performance-monitoring tools.
  • the local area network ties the entire system together and makes possible the distributed virtual machine model described below.
  • the LAN provides high throughput, guaranteed response, reliability, and low entry cost.
  • the LAN is also autonomous, in the sense that all system and applications software is unaware of its existence. For example, any Network Interface Module (e.g. NIM 21, FIG. 2) could be replaced without rewriting any software other than that which directly drives it.
  • NIM 21, FIG. 2 any Network Interface Module
  • the LAN interconnection medium may be twisted-pair or coaxial cable.
  • Two channels (logically, two distinct networks) may be provided for reliability and for increased throughput.
  • the LAN architecture is a logical ring, in which an electronic "token" is constantly passed from cell to cell at high speed.
  • the current holder of the token may use it to send a "frame" of data or may pass it on to the next cell in the ring.
  • the NIM only needs to know the logical address and status of its immediately succeeding neighbor. The NIM's responsibility is limited to detecting the failure of that neighbor or the inclusion of a new neighbor. In general, adjustment to failed or newly added cells is automatic.
  • the network interface maps directly into the processor's memory. Data exchange occurs through a dual-ported buffer pool which contains a linked list of pending "frames". Logical messages, which vary in length, are broken into fixed-size frames for transmission and are re-assembled by the receiving NIM. Frames are sequence-numbered for this purpose. If a frame is not acknowledged within a short period of time, it is retransmitted a number of times before being treated as a failure.
  • the LAN may be connected to other LAN's operating under the same LAN protocol via so-called “bridgeways”, or it may be connected to other types of LAN's via "gateways".
  • the computer operating system of the present invention operates upon processes, messages, and contexts, as such terms are defined hereinafter in the section entitled "Virtual Machine”.
  • This operating system offers the programmer a hardware abstraction, rather than a data or control abstraction.
  • Processes are referenced without regard to their physical location via a small set of message-passing primitives. Every process has both a unique system-generated identifier and a not necessarily unique name assigned by the programmer. The identifier provides quick direct access, while the name has a limited scope and provides symbolic, indirect access.
  • the bottom, or hardware, layer 63 comprises a number of processors 71-76, as described above.
  • the processors 71-76 may exist physically within one or more cells.
  • the top, or software, layer 60 illustrates a number of processes P1-P10 which send messages m1-m6 to each other.
  • the middle layer 61 labelled "virtual machine", isolates the hardware from the software, and it allows programs to be written as if they were going to be executed on a single processor. Conversely, programs can be distributed across multiple processors without having been explicitly designed for that purpose.
  • a "process” is a self-contained package of data and executable procedures which operate on that data.
  • the data is totally private and cannot be accessed by other processes.
  • There is no concept of shared memory within the present invention. Execution of a process is strictly sequential. Multiple processes execute concurrently and must be scheduled by the operating system. The processes can be re-entrant, in which case only one copy of the code is loaded even if multiple instances are active.
  • Every process has a unique "process identifier number" (PID) by which it can be referenced.
  • PID process identifier number
  • the PID is assigned by the system when the process is created and remains in effect until the process terminates.
  • the PID assignment contains a randomizing factor which guarantees that the PID will not be re-used in the near future.
  • the contents of the PID are irrelevant to the programmer but are used by the virtual machine to physically locate the process.
  • a PID may be thought of as a "pointer" to a process.
  • Every process also has a "name" which is a variable-length string of characters assigned by the programmer.
  • a name need not be unique, and this ambiguity may be used to add new services transparently and to aid in fault-tolerance.
  • FIG. 4 illustrates that the system-wide name space is partitioned into distinct subsets by means of "contexts" identified by reference numerals 90-92.
  • a context is simply a collection of related processes whose names are not known outside of the context.
  • Context 90 for example, contains processes A, a, a, b, c, d, and e.
  • Context 91 contains processes B, a, b, c, and f.
  • context 92 contains processes C, a, c, d, and x.
  • context process One particular process in each context, called the “context process”, is known both within the context and within the immediately enclosing one (referred to as its “parent context”).
  • processes A-C are context processes for contexts 90-92, respectively.
  • the parent context of context 91 is context 90
  • the parent context of context 92 is context 91.
  • the context process is located on the boundary of the context and acts as a gate into it.
  • Processes inside context 92 can reference any processes inside contexts 90 and 91 by name. However, processes in context 91 can only access processes in context 92 by going through the context process C. Processes in context 90 can only access processes in context 92 by going through context processes B and C.
  • Contexts may be nested, allowing a hierarchy of abstractions to be constructed. A context must reside completely on one cell. The entire system is treated as an all-encompassing context which is always present and which is the highest level in the hierarchy. In enssence, contexts define localized protection domains and greatly reduce the chances of unintentional naming conflicts.
  • a process inside one context can be "connected" to one inside another context by exchanging PID's, once contact has been established through one or the other of the context processes.
  • Most process servers within the present invention function that way. Initial access is by name. Once the desired function (such as a window or file) is "opened", the user process and the service communicate directly via PID's.
  • a “message” is a variable-length buffer (limited only by the processor's physical memory size) which carries information between processes.
  • a header, inaccessible to the programmer, contains the destination name and the sender's PID.
  • the first field in a message is a null-terminated string which defines the type of message (e.g., "read”, "status”, etc.) Messages are queued to the receiving process when they are sent. Queuing ensures serial access and is used in preference to semaphores, monitors, etc.
  • Messages provide the mechanism by which hardware transparency is achieved.
  • a process located anywhere in the virtual machine can send a message to any other process if it knows its name.
  • Transparency applies with some restrictions across bridgeways (i.e., the interfaces between LAN's operating under identical network protocols) and, in general, not at all across gateways (i.e., the interfaces between LAN's operating under different network protocols) due to performance degradation. However, they could so operate, depending upon the required level of performance.
  • the virtual machine makes devices look like processes. For example, when an interrupt occurs in an external device 101, the virtual machine kernel 61 queues an interrupt message 103 to a specific process 104, known as an "external event service process" (EESP), functioning as the device manager. For efficiency, the message is pre-allocated once and circulates between the EESP and the kernel. The message contains just enough information to indicate the ocurrence of the event.
  • EESP performs all hardware-specific functions related to the event, such as setting control registers, moving data 105 to a user process 106, transmitting "Read” messages from the user process 106, etc., and then "releasing" the interrupt.
  • a process issues a "connect” primitive specifying the appropriate device register(s). It must execute a "disconnect” before it exits.
  • Device-independence is achieved by making the message protocol between EESP's and applications processes the same wherever possible.
  • the virtual machine kernel primitives are the following:
  • ALLOC handles all memory allocations. It returns a pointer to a buffer which can be used for local storage within the process or which can be sent to another process (via PUT, etc.). ALLOC never "fails”, but rather waits until enough memory is freed to satisfy the request.
  • the PUT primitive queues a message to another process.
  • the sending process resumes execution as soon as the message is queued.
  • FORWARD is used to quickly reroute a message but maintain information about the original sender (whereas PUT always makes the sending process the originator of the message).
  • REPLY sends a message to the originator of a previously received message, rather than by name or PID.
  • CALL essentially implements remote subroutine invocations, causing the caller to suspend until the receiver executes a REPLY. Subsequently, the replied message is dequeued out of sequence, immediately upon arrival, and the caller resumes execution.
  • the destination process When a message is sent by name, the destination process must be found in the name space.
  • the search path is determined by the nesting of the contexts in which the sending process resides. From a given process, a message can be sent to all processes in its own context or (optionally) to those in any higher context. Refer to FIG. 6. The contexts are searched from the current one upward until a match is found or until the system context is reached. All processes with the same name in that context are then queued a copy of the message.
  • process y sends a message to ALL processes by the name x.
  • Process y first searches within its own context 141 but finds no process x.
  • the process y searches within the next higher context 131 (its parent context) but again finds no process x.
  • process y searches within the next higher context 110 and finds a process x, identified by reference numeral 112. Since it is the only process x in context 110, it is the only recipient of the message from process y.
  • process a in context 131 sends a message to ALL processes by the name x, it first searches within its own context 131 and, finding no processes x there, it then searches within context 110 and finds process x.
  • process b in context 131 sends a message to ALL processes by the name A. It would find process A (111) in context 110, as well as process A (122) which is the context process for context 121.
  • a process may also send a message to itself or to its context process without knowing either name explicitly.
  • the virtual machine guarantees that each NEXT transmission will reach a different process and that eventually a transmission will be sent to the logically "first" process (the one that sent the original message) in the ring, completing the loop. In other words, all processes with the same name at the same level can communicate with each other without knowing how many there are or where they are located.
  • the logical ring is essential for distributing services such as a data base. The ordering of processes in the ring is not predictable.
  • process a (125) in context 121 sends a message to process a using the NEXT primitive
  • the search finds a first process a (124) in the same context 121.
  • Process a (124) is marked as having received the message, and then process a (124) sends the message on to the NEXT process a (123) in context 121.
  • Process a (123) is marked as having received the message, and then it sends the message on to the NEXT process a, which is the original sender process a (125), which knows not to send it further on, since it's been marked as having already received the message.
  • a process sends a message in the LOCAL transmission mode, it sends it only to a process having the given name in the sender's own context.
  • Messages are usually transmitted by queueing a pointer to the buffer containing the message.
  • a message is only copied when there are multiple destinations or when the destination is on another cell.
  • the operating system of the present invention consists of a kernel, which implements the primitives described above, plus a set of processes which provide process creation and termination, time management (set time, set alarm, etc.) and which perform cell start-up and configuration.
  • Drivers for devices are also implemented as processes (EESP's), as described above. This allows both system services and device drivers to be added or replaced easily.
  • the operating system also supports swapping and paging, although both are invisible to applications software.
  • a minimal bootstrap program resides permanently (in ROM) on every cell, e.g. ROM 28 in cell N of FIG. 2.
  • the bootstrap program executes automatically when a cell is powered up and begins by performing basic on-board diagnostics. It then attempts to find and start an initial system code module which comprises the entire kernel, and EESP's for the clock, disk (if required), and NIM (if required).
  • the module is sought on the first disk drive on the cell, if any. If there isn't a disk, and the cell is on the LAN, a message will be sent out requesting the module. Failing that, the required software must be resident in ROM.
  • System services for the clock and for process creation, an initialization program, and a minimal file system are also built into the module.
  • the initialization program sets up all of the kernel's internal tables and then calls predefined entry points in each of the preloaded services (file management, etc.). The net result is that EESP's for the attached devices are scheduled to run, and the cell is available.
  • a template file describing the initial software and hardware for each cell in the system.
  • the template defines a set of initial processes (usually one per service) which are scheduled immediately after the cell start-up. These processes then start up their respective subsystems.
  • a cell configuration service on each cell sends configuration messages to each subsystem when it is being initialized, informing it of the devices it owns. Thereafter, similar messages are sent whenever a new device is added to the cell or a device fails or is removed from the cell.
  • the present invention allows the user to store and retrieve data at several levels of abstraction. At various levels it provides device-independence, transparency, multiple views of the same data and support for transaction processing. Transparency means that a process need not know where a file is stored in order to access it. It also means that the file can be moved to another device without affecting the process. Only as many levels as are required for a particular application need be included in the system.
  • the lowest level of data management is the physical disk layer 153, which is completely hidden from all applications software 155.
  • virtual disks 152 which define an interface in terms of linear arrays of 1K blocks, regardless of the actual medium. Although the usual medium is disk, RAM may also be used (for temporary files) to improve performance.
  • Three types of messages are supported at this level: “initial”, to format the virtual disk, and “read” and “write” to access specific blocks.
  • the third level, disk management 151 organizes data within a virtual disk by means of indices.
  • a disk index is a file at this level and is viewed as an extensible linear array of bytes. Messages are accepted to initialize the disk, allocate and delete indices, and read and write indices. The later two functions operate starting at a given byte offset for a given byte length. An index is automatically extended when a request references a location outside the current limits. Physical storage is allocated only when data is actually written. Optional data caching is supported at the disk management level on a per cell basis.
  • File management 150 is layered on top of disk management 151 and introduces the concept of a "file system".
  • a file system is a collection of named files (or named indices, in terms of the disk management layer 151).
  • the name space constitutes a flat (single-level) directory which is allocated when the file system is initialized.
  • a name may be up to 64 characters long and is hashed into the directory.
  • Unnamed files are useful for building complex disk structures which are logically linked to each other, such as a hierarchical file directory or a database, or for temporary files which only the creator will use.
  • Transparency is supported only at the file management level 150 and above. It is used by simply omitting the file system name from the request (NEW, DELETE, RENAME, or OPEN). In this case, the request is forwarded through all file systems until the given file name is found.
  • the highest level 154 of data management deals in terms of "metaphors", which implement application-specific views of the data.
  • a relational database is one example of a metaphor. Complex operations such as multi-user synchronization and record- or field-locking may be implemented at this level.
  • the present invention supports two built-in views of the data: "plain" files, which are superficially equivalent to UNIXTM files, and a relational database.
  • FIG. 8 illustrates the design of the data management software up to the plain-file level.
  • Each active (mounted) file system 165 is represented by a file management context 160.
  • the set of all such contexts forms a logical ring for purposes of message transmission; in other words, they all have the same name ("file -- mgt").
  • file -- mgt The actual name of the file system (stored on the disk 166 at initialization) is known only to the context process.
  • the human interface (HI) of the present invention provides a set of tools with which an end user can construct a package specific to his applications requirements. Such a package is referred to as a "metaphor", since it reflects the user's particular view of the system.
  • a package is referred to as a "metaphor”, since it reflects the user's particular view of the system.
  • Multiple metaphors can be supported concurrently.
  • One representative metaphor is, for example, a software development environment.
  • the purpose of the HI metaphor is to allow consistent, integrated access to the data and functions available in the system. Since user's perceptions of the system are based largely on the way they interact with it, it is important to provide an interface with which they feel comfortable.
  • the HI allows a systems designer to create a model consisting of objects that are familiar to the end user and a set of actions that can be applied to them.
  • the fundamental concept of the HI is that of the "picture". All visually-oriented information, regardless of interpretation, is represented by pictures.
  • a picture (such as a diagram, report, menu, icon, etc.) is defined in a device-independent format which is recognized and manipulated by all programs in the HI and all programs using the HI. It consists of "picture elements”, such as “line”, “arc”, and “text”, which can be stored compactly and transferred efficiently between processes. All elements have common attributes like color and fill pattern. Most also have type-specific attributes, such as typeface and style for text. Pictures are drawn in a large "world” co-ordinate system composed of "virtual pixels".
  • a virtual input device accepts keyboards, mice, light pens, analog dials, pushbuttons, etc. and translates them into text, cursor-positioning, action, dial, switch, and number messages. All physical input devices must map into this set of standard messages. Only one process, an input manager for the specific device, is responsible for performing the translation. Other processes can then deal with the input without being dependent on its source.
  • a virtual output manager translates standard output messages to the physical representation appropriate to a specific device (screen, printer, plotter, etc.)
  • a picture drawn on any terminal or by a process can be displayed or printed on any device, subject to the physical limitations of that device.
  • picture A is illustrated as containing at least one view 171
  • picture B contains at least one view 175.
  • Views can be used, for example, to partition a screen for multiple applications or to extract page-sized subsets of a picture for printing.
  • view 171 of picture A is mapped to screen 176 as window 177, and view 175 of picture B is mapped as window 178.
  • the HI allows the user to dynamically change the size of the window, move the window around on the screen, and move the picture under the window to view different parts of it (i.e., scroll in any direction). If a picture which is mapped to one or more windows changes, all affected views of that picture on all screens are automatically updated. There is no logical limit to the number or sizes of windows on a particular screen. Since the system is distributed, it's natural for pictures and windows to be on different cells. For example, several alarm displays can share a single, common picture.
  • the primary mechanism for interacting with the HI is to move the cursor to the desired object and "select" it by pressing a key or button.
  • An action may be performed automatically upon selection or by further interaction, often using menus. For example, selecting an icon usually activates the corresponding application immediately. Selecting a piece of text is often followed by selection of a command such as "cut” or "underline”.
  • Actions can be dynamically mapped to function keys on a keyboard so that pressing a key is equivalent to selecting an icon or a menu item.
  • a given set of cursors (the cursor changes as it moves from one application picture to another), windows, menus, icons, and function keys define a "metaphor".
  • the HI builds on the above concepts to provide a set of distributed services. These include electronic mail, which allows two or more users at different terminals to communicate with each other in real time or to queue files for later delivery, and a forms manager for data entry.
  • electronic mail which allows two or more users at different terminals to communicate with each other in real time or to queue files for later delivery
  • a forms manager for data entry a subclass of windows called "virtual terminals" provides emulation of standard commercially available terminals.
  • FIG. 10 shows the different levels of the HI and data flow through them.
  • Arrows 201-209 indicate the most common paths, while arrows 210-213 indicate additional paths.
  • the interface can be configured to leave out unneeded layers for customized applications.
  • the philosophy behind the HI design dictates one process per object. That is, a process is created for each active window, picture, input or output device, etc. As a result, the processes are simplified and can be distributed across cells almost arbitrarily.
  • An error management service is provided to catch errors and report them to the appropriate process(es). It serves as a foundation upon which more sophisticated diagnostics and/or recovery schemes may be constructed.
  • the system can intercept processor internal exceptions (bus and address errors, "trap” instructions, etc.), external exceptions (such as a spurious interrupts), device faults, and software-defined errors.
  • the latter category is open-ended and comprises unexpected termination of a process, the result of a diagnostic program, or in general any error detected by the kernel or by any process. Failure to find the destination of a transmitted message is one example. While internal exceptions can be associated with the particular process which caused the error, external exceptions are independent, although they may directly impact one or more processes.
  • the prime functions of the error management service are to: (1) classify and log errors, (2) generate notification messages, (3) accept requests to configure the service and specify options, (4) accept software error messages from other subsystems, and (5) terminate affected processes, if required.
  • Item (3) above allows applications and services to indicate that they want to know about specific errors or classes of errors.
  • Options include automatic logging, automatic display on the operator's terminal, automatic suspension (for debugging) or abortion of the offending process, and automatic dumping of the process image to a file.
  • the default actions, if no options have been specified, are termination, logging and display. Any outstanding request can be cancelled at any time.
  • the HI logging service provides the facility to store error messages in a chronological file, maintain a hard-copy log, and create a dynamic display of errors, ordered by time, priority, class, etc.
  • the debugger is often invoked upon occurrence of a process error to examine the process' state for clues.
  • FIG. 11 a block diagram is shown of a logical ring of file systems, illustrating how an access request to a file system is handled by the present invention.
  • Each mounted disk volume in the distributed data processing system of the present invention constitutes a file system.
  • Each file system is managed by a file management context whose architecture is represented by FIG. 8.
  • FIG. 8 On a relatively large system there may be any number of active file systems (i.e. active file management contexts), where each file management context has the name "file -- mgt".
  • the set of these contexts is connected together in a logical ring, as shown in FIG. 11.
  • the name of file system is established when a disk volume is initialized.
  • the file system name is written into the volume header on the disk.
  • a file management context starts up, it attempts to read the volume header of its associated disk. If successful, the volume name is read and becomes the name of the file system which that context manages. If unsuccessful, the volume is marked as uninitialized. Thereafter only an INITIAL command is accepted.
  • requests which reference a file by name are sent to the context process "file -- mgt".
  • Requests which access data are sent directly by their PID to the disk -- mgt process within the file management context. This PID, as well as the associated disk index, is returned in the reply to a successful NEW or OPEN command. This connects the user (e.g., a data management process) to a specific file allocation on a specific volume.
  • all active file management contexts are viewed as forming a logical ring.
  • Requests referencing a file by name are sent to the context process named "file -- mgt" using transmission mode NEXT.
  • Each context process "file -- mgt” determines whether the request is for the file system which it manages, and, if it is not, it forwards the request to the next context "file -- mgt". If a request circulates the logical ring without success, then it is returned to the caller with an error indication.
  • a user 300 e.g. an application context
  • the file access request is first received by the "file -- mgt” context process of file system "B” 302, which determines that the request is not for file system “B” and forwards it to file system "S” 304.
  • file system "S” 304 forwards the request on to file system "G” 306.
  • the "file -- mgt” context process of file system "G” 306 recognizes that the request is intended for this file system and then responds to user 300 that it will attempt to satisfy the request.
  • file access request Had the file access request circulated the entire loop without success, it would have returned to user 300 with an error message.
  • a given file system e.g. file system "B" 302
  • a file access request may either specify both a file system name and a file name, or it may simply specify a file name. Data residence transparency is achieved by not specifying the file system name.
  • user 300 doesn't know on which file system a desired file is located or doesn't care where a file is to be opened. In this case, an attempt is made by each successive "file -- mgt" context to satisfy the request of user 300.
  • the set of all disk volumes in the system may be considered one large disk space, and the user doesn't have to know on which file system any given file is logically or physically located.
  • File system "B” 302 will first attempt to satisfy the request. However, if it's unable to, e.g. because of insufficient space, it forwards the request on to file system "S" 304. If file system "S" 304 is capable of satisfying the request, it so notifies user 300. Otherwise, the request continues on to each file system in turn until one is able to satisfy the request. If none is able to satisfy the request, an error message is returned to user 300. As mentioned above, once a file system fails to satisfy the request, it marks the attempt, so that it doesn't attempt to satisfy the request if the request circulates around the entire loop without being satisfied.
  • FIG. 12 illustrates how a file access request is handled by the present invention.
  • a file access request is received in block 320.
  • Decision block 321 queries whether this is a wrap-around. If so, an error message is sent to the user, as indicated by block 322. If not, the procedure passes to decision block 323, which queries whether a file system has been specified. If not, this particular file system attempts to satisfy the request, as indicated by block 325. If so, decision block 324 queries whether this particular file system is the one specified. If so, this particular file system attempts to satisfy the request.
  • the request is marked for wrap-around, as shown by block 328, and the request is forwarded to the next file system, as shown by block 329.
  • decision block 330 queries whether a file system was specified. If so, an error message is sent to the user, as indicated by block 331. If not, the request is marked for wrap-around (block 328), and the request is forwarded to the next file system (block 329).
  • Appendix A contains a "C" language implementation of the flow diagram shown in FIG. 12.
  • Appendix B is a detailed description of the relevant portions of the source code listing of Appendix A.

Abstract

A data management system used by a digital computer system comprises a plurality of individual file systems which are connected together in a logical ring configuration around which file requests travel. File requests may be transmitted by the user to the "next" file system in the ring relative to the user.
File requests optionally may or may not specify a file system name. If a file system name is specified, then the request is forwarded unidirectionally around the logical ring until either that file system name is found or the request returns to its starting point. If no file system name is specified, then an attempt is made to satisfy the request on each file system in turn until either the request is satisfied or the request returns to its starting point.

Description

RELATED INVENTIONS
This application is a continuation of prior application Ser. No. 110,614, filed Oct. 19, 1987, now abandoned which is a continuation of Ser. No. 730,929, filed May 6, 1985, now abandoned.
The present invention is related to the following inventions, filed on even date herewith, all assigned to the assignee of the present invention:
1. Title: Nested Contexts in a Virtual Single Machine;
Inventors: Andrew Kun, Frank Kolnich and Bruce Mansfield
Ser. No.: 730,903 (now abandoned) and Ser. No. 270,437, filed 11/07/88, now abandoned.
2. Title: Network Interface Module With Minimized Data Paths; Inventors: Bernard Weisshaar and Michael Barnea; Ser. No.: 730,621, now U.S. Pat. No. 4,754,395.
3. Title: Method of Inter-Process Communication in a Distributed Data Processing System; Inventors: Bernard Weisshaar, Frank Kolnick, Andrew Kun, and Bruce Mansfield; Ser. No.: 730,892, now U.S. Pat. No. 4,694,396.
4. Title: Logical Ring in a Virtual Single Machine; Inventors: Andrew Kun, Frank Kolnick and Bruce Mansfield; Ser. No.: 730,923 (now abandoned) and Ser. No. 183,469, filed 4/15/88 (continuation).
5. Title: Virtual Single Machine With Message-Like Hardware Interrupts and Processor Exceptions; Inventor: Andrew Kun; Ser. No.: 730,922.
TECHNICAL FIELD
This invention relates generally to digital data processing, and, in particular, to a data management system comprising a plurality of file systems coupled in a logical ring.
BACKGROUND OF THE INVENTION
The present invention concerns a distributed data processing system--that is, two or more data processing systems which are capable of functioning independently but which are so coupled as to send and receive messages to and from one another.
A Local Area Network (LAN) is an example of a distributed data processing system. A typical LAN comprises a number of autonomous data processing "cells", each comprising at least a processor and memory. Each cell is capable of conducting data processing operations independently. In addition, each cell is coupled (by appropriate means such as a twisted wire pair, coaxial cable, fiber optic cable, etc.) to a network of other cells which may be, for example, a loop, star, tree, etc., depending upon the design considerations.
As mentioned above, the present invention finds utility in such a distributed data processing system, since there is a need in such a system for the processes which are executing or to be executed in the individual cells to share data and to communicate data among themselves.
Information may be thought of as being stored in the form of files in one or more "file systems". A file system is a way of logically organizing data, and it may comprise one or more physical data storage devices. Usually, a file system comprises an organized arrangement of data and a file index identifying the data, its location, and perhaps other characteristics.
In the present invention, any of the individual cells of a LAN may contain one or more file systems. Certain file systems may be unique, while other file systems may be copies in order to provide a degree of redundancy.
There is an urgent need in certain distributed data processing systems to provide "data access transparency". Data access transparency is defined herein to mean that any file can be accessed by any process located anywhere in the distributed data processing system.
There is also an urgent need regarding certain of such distributed data processing systems to provide "data residence transparency". Data residence transparency is defined herein to mean that any file can be accessed wherever it may reside, even if it has been physically moved within the system.
BRIEF SUMMARY OF INVENTION
Accordingly, it is an object of the present invention to provide an improved data management system within a distributed data processing system.
It is also an object of the present invention to provide a distributed data processing system having a data management system with data access transparency.
It is a further object of the present invention to provide a distributed data processing system having a data management system with data residence transparency.
These and other objects are achieved in accordance with a preferred embodiment of the invention by providing a data management system for use in a data processing system, the data management system comprising a plurality of individual file systems, means for coupling the file systems together, means for generating an access request to one of the file systems, and means for attempting to satisfy the access request by accessing successive file systems until either the access request is satisfied or until all of the file systems have been accessed.
BRIEF DESCRIPTION OF THE DRAWINGS
The invention is pointed out with particularity in the appended claims. However, other features of the invention will become more apparent and the invention will be best understood by referring to the following detailed description in conjunction with the accompanying drawings in which:
FIG. 1 shows a representational illustration of a single network, distributed data processing system incorporating the improved data management system of the present invention.
FIG. 2 shows a block diagram illustrating a multiple-network, distributed data processing system incorporating the improved data management system of the present invention.
FIG. 3 shows an architectural model of a data processing system incorporating the present invention.
FIG. 4 shows the relationship between software contexts and processes as they relate to the present invention.
FIG. 5 shows the relationship between external events and processes.
FIG. 6 shows how messages may be sent between processes within nested contexts.
FIG. 7 shows an architectural model of the improved data management system incorporating the present invention.
FIG. 8 shows an architectural software model of the improved data management system incorporating the present invention.
FIG. 9 shows the relationship between pictures, views, and windows in the human interface of a data processing system incorporating the present invention.
FIG. 10 shows a conceptual view of the different levels of human interface within a data processing system incorporating the present invention.
FIG. 11 shows a block diagram of a logical ring of file systems, illustrating how an access request to a file system is handled by the present invention.
FIG. 12 shows a flow diagram illustrating the operation of the improved data management system of the present invention.
OVERVIEW OF COMPUTER SYSTEM
With reference to FIG. 1, a distributed computer configuration is shown comprising multiple cells 2-7 (nodes) loosely coupled by a local area network (LAN) 1. The number of cells which may be connected to the network is arbitrary and depends upon the user application. Each cell comprises at least a processor and memory, as will be discussed in greater detail with reference to FIG. 2 below. In addition, each cell may also include other units, such as a printer 8, operator display module (ODM) 9, mass memory module 13, and other I/O device 10.
With reference now to FIG. 2, a multiple-network distributed computer configuration is shown. A first local area network LAN 1 comprises several cells 2, 4, and 7. LAN 1 is coupled to a second local area network LAN 2 by means of an Intelligent Communications Module (ICM) 50. The Intelligent Communications Module provides a link between the LAN and other networks and/or remote processors (such as programmable controllers).
LAN 2 may comprise several cells (not shown) and may operate under the same LAN protocol as that of the present invention, or it may operate under any of several commercially available protocols, such as Ethernet; MAP, the Manufacturing Automation Protocol of General Motors Corp.; Systems Network Architecture (SNA) of International Business Machines, Inc.; SECS-II; etc. Each ICM 50 is programmable for carrying out one of the above-mentioned specific protocols. In addition, the basic processing module of the cell itself can be used as an intelligent peripheral controller (IPC) for specialized devices.
LAN 1 is additionally coupled to a third local area network LAN 3 via ICM 52. A process controller 55 is also coupled to LAN 1 via ICM 54.
A representative cell N (7, FIG. 2) comprises a processor 24 which, in a preferred embodiment, is a Motorola 68010 processor. Each cell further includes a read only memory (ROM) 28 and a random access memory (RAM) 26. In addition, each cell includes a Network Interface Module (NIM) 21, which connects the cell to the LAN, and a Bus Interface 29, which couples the cell to additional devices within a cell. While a minimal cell is capable of supporting two peripheral devices, such as an Operator Display Module (ODM) 41 and an I/O Module 44, additional devices (including additional processors, such as processor 27) can be provided within a cell. Other additional devices may comprise, for example, a printer 42, and a mass-storage module 43 which supports a hard disk and a back-up device (floppy disk or streaming tape drive).
The Operator Display Module 41 provides a keyboard and screen to enable an operator to input information and receive visual information.
While a single cell may comprise all of the above units, in the typical user application individual cells will normally be dedicated to specialized functions. For example, one or more mass storage cells may be set up to function as data base servers. There may also be several operator consoles and at least one cell for generating hard-copy printed output. Either these same cells, or separate dedicated cells, may execute particular application programs.
The system is particularly designed to provide an integrated solution for factory automation, data acquisition, and other real-time applications. As such, it includes a full complement of services, such as a graphical output, windows, menus, icons, dynamic displays, electronic mail, event recording, and file management. Software development features include compilers, a window-oriented editor, a debugger, and performance-monitoring tools.
Local Area Network
The local area network, as depicted in either FIG. 1 or FIG. 2, ties the entire system together and makes possible the distributed virtual machine model described below. The LAN provides high throughput, guaranteed response, reliability, and low entry cost. The LAN is also autonomous, in the sense that all system and applications software is unaware of its existence. For example, any Network Interface Module (e.g. NIM 21, FIG. 2) could be replaced without rewriting any software other than that which directly drives it.
The LAN interconnection medium may be twisted-pair or coaxial cable. Two channels (logically, two distinct networks) may be provided for reliability and for increased throughput.
The LAN architecture is a logical ring, in which an electronic "token" is constantly passed from cell to cell at high speed. The current holder of the token may use it to send a "frame" of data or may pass it on to the next cell in the ring. The NIM only needs to know the logical address and status of its immediately succeeding neighbor. The NIM's responsibility is limited to detecting the failure of that neighbor or the inclusion of a new neighbor. In general, adjustment to failed or newly added cells is automatic.
The network interface maps directly into the processor's memory. Data exchange occurs through a dual-ported buffer pool which contains a linked list of pending "frames". Logical messages, which vary in length, are broken into fixed-size frames for transmission and are re-assembled by the receiving NIM. Frames are sequence-numbered for this purpose. If a frame is not acknowledged within a short period of time, it is retransmitted a number of times before being treated as a failure.
As described above with reference to FIG. 2, the LAN may be connected to other LAN's operating under the same LAN protocol via so-called "bridgeways", or it may be connected to other types of LAN's via "gateways".
Software Model
The computer operating system of the present invention operates upon processes, messages, and contexts, as such terms are defined hereinafter in the section entitled "Virtual Machine". This operating system offers the programmer a hardware abstraction, rather than a data or control abstraction.
Processes are referenced without regard to their physical location via a small set of message-passing primitives. Every process has both a unique system-generated identifier and a not necessarily unique name assigned by the programmer. The identifier provides quick direct access, while the name has a limited scope and provides symbolic, indirect access.
With reference to FIG. 3, an architectural model of the present invention is shown. The bottom, or hardware, layer 63 comprises a number of processors 71-76, as described above. The processors 71-76 may exist physically within one or more cells. The top, or software, layer 60 illustrates a number of processes P1-P10 which send messages m1-m6 to each other. The middle layer 61, labelled "virtual machine", isolates the hardware from the software, and it allows programs to be written as if they were going to be executed on a single processor. Conversely, programs can be distributed across multiple processors without having been explicitly designed for that purpose.
An important purpose of the virtual machine concept herein-disclosed is to provide the applications programmer with a simple, consistent model in which to design his system. This model, as mentioned above, is reduced to several elemental concepts: processes, messages, and contexts, each of which will be defined and discussed in detail below. As a consequence of this elemental model, hardware peculiarities are made transparent to the user, and changes in hardware configurations have no direct effect on the software.
The Virtual Machine
A "process" is a self-contained package of data and executable procedures which operate on that data. The data is totally private and cannot be accessed by other processes. There is no concept of shared memory within the present invention. Execution of a process is strictly sequential. Multiple processes execute concurrently and must be scheduled by the operating system. The processes can be re-entrant, in which case only one copy of the code is loaded even if multiple instances are active.
Every process has a unique "process identifier number" (PID) by which it can be referenced. The PID is assigned by the system when the process is created and remains in effect until the process terminates. The PID assignment contains a randomizing factor which guarantees that the PID will not be re-used in the near future. The contents of the PID are irrelevant to the programmer but are used by the virtual machine to physically locate the process. A PID may be thought of as a "pointer" to a process.
Every process also has a "name" which is a variable-length string of characters assigned by the programmer. A name need not be unique, and this ambiguity may be used to add new services transparently and to aid in fault-tolerance.
FIG. 4 illustrates that the system-wide name space is partitioned into distinct subsets by means of "contexts" identified by reference numerals 90-92. A context is simply a collection of related processes whose names are not known outside of the context. Context 90, for example, contains processes A, a, a, b, c, d, and e. Context 91 contains processes B, a, b, c, and f. And context 92 contains processes C, a, c, d, and x.
One particular process in each context, called the "context process", is known both within the context and within the immediately enclosing one (referred to as its "parent context"). In the example illustrated in FIG. 4, processes A-C are context processes for contexts 90-92, respectively. The parent context of context 91 is context 90, and the parent context of context 92 is context 91. Conceptually, the context process is located on the boundary of the context and acts as a gate into it.
Processes inside context 92 can reference any processes inside contexts 90 and 91 by name. However, processes in context 91 can only access processes in context 92 by going through the context process C. Processes in context 90 can only access processes in context 92 by going through context processes B and C.
The function of the context process is to filter incoming messages and either reject them or reroute them to other processes in its context. Contexts may be nested, allowing a hierarchy of abstractions to be constructed. A context must reside completely on one cell. The entire system is treated as an all-encompassing context which is always present and which is the highest level in the hierarchy. In enssence, contexts define localized protection domains and greatly reduce the chances of unintentional naming conflicts.
If appropriate, a process inside one context can be "connected" to one inside another context by exchanging PID's, once contact has been established through one or the other of the context processes. Most process servers within the present invention function that way. Initial access is by name. Once the desired function (such as a window or file) is "opened", the user process and the service communicate directly via PID's.
A "message" is a variable-length buffer (limited only by the processor's physical memory size) which carries information between processes. A header, inaccessible to the programmer, contains the destination name and the sender's PID. By convention, the first field in a message is a null-terminated string which defines the type of message (e.g., "read", "status", etc.) Messages are queued to the receiving process when they are sent. Queuing ensures serial access and is used in preference to semaphores, monitors, etc.
Messages provide the mechanism by which hardware transparency is achieved. A process located anywhere in the virtual machine can send a message to any other process if it knows its name. Transparency applies with some restrictions across bridgeways (i.e., the interfaces between LAN's operating under identical network protocols) and, in general, not at all across gateways (i.e., the interfaces between LAN's operating under different network protocols) due to performance degradation. However, they could so operate, depending upon the required level of performance.
With reference now to FIG. 5, the relationship of external events to processes will now be described. The virtual machine makes devices look like processes. For example, when an interrupt occurs in an external device 101, the virtual machine kernel 61 queues an interrupt message 103 to a specific process 104, known as an "external event service process" (EESP), functioning as the device manager. For efficiency, the message is pre-allocated once and circulates between the EESP and the kernel. The message contains just enough information to indicate the ocurrence of the event. The EESP performs all hardware-specific functions related to the event, such as setting control registers, moving data 105 to a user process 106, transmitting "Read" messages from the user process 106, etc., and then "releasing" the interrupt.
To become an EESP, a process issues a "connect" primitive specifying the appropriate device register(s). It must execute a "disconnect" before it exits. Device-independence is achieved by making the message protocol between EESP's and applications processes the same wherever possible.
Inter-Process Communication
All inter-process communication is via messages. Consequently, most of the virtual machine primitives are concerned with processing messages. The virtual machine kernel primitives are the following:
ALLOC--requests allocation of a (message) buffer of a given size.
FREE--requests deallocation of a given message buffer.
PUT--end a message to a given destination (by name or PID).
GET--wait for and dequeue the next incoming message, optionally from a specific process (by PID).
FORWARD--pass a received message through to another process.
CALL--send a message, then wait for and dequeue the reply.
REPLY--send a message to the originator of a given message.
ANY-- MSG--returns "true" if the receive queue is not empty, else returns "false"; optionally, checks if any messages from a specific PID are queued.
To further described the function of the kernel primitives, ALLOC handles all memory allocations. It returns a pointer to a buffer which can be used for local storage within the process or which can be sent to another process (via PUT, etc.). ALLOC never "fails", but rather waits until enough memory is freed to satisfy the request.
The PUT primitive queues a message to another process. The sending process resumes execution as soon as the message is queued.
FORWARD is used to quickly reroute a message but maintain information about the original sender (whereas PUT always makes the sending process the originator of the message).
REPLY sends a message to the originator of a previously received message, rather than by name or PID.
CALL essentially implements remote subroutine invocations, causing the caller to suspend until the receiver executes a REPLY. Subsequently, the replied message is dequeued out of sequence, immediately upon arrival, and the caller resumes execution.
The emphasis is on concurrency, so that as many processes as possible are executed in parallel. Hence neither PUT nor FORWARD waits for the message to be delivered. Conversely, GETS suspends a process until a message arrives and dequeues it in one operation. The ANY-- MSG primitive is provided so that a process may determine whether there is anything of interest in the queue before committing itself to a GET.
When a message is sent by name, the destination process must be found in the name space. The search path is determined by the nesting of the contexts in which the sending process resides. From a given process, a message can be sent to all processes in its own context or (optionally) to those in any higher context. Refer to FIG. 6. The contexts are searched from the current one upward until a match is found or until the system context is reached. All processes with the same name in that context are then queued a copy of the message.
For example, with reference to FIG. 6, assume that in context 141 process y sends a message to ALL processes by the name x. Process y first searches within its own context 141 but finds no process x. The process y searches within the next higher context 131 (its parent context) but again finds no process x. Then process y searches within the next higher context 110 and finds a process x, identified by reference numeral 112. Since it is the only process x in context 110, it is the only recipient of the message from process y.
If process a in context 131 sends a message to ALL processes by the name x, it first searches within its own context 131 and, finding no processes x there, it then searches within context 110 and finds process x.
Assume that process b in context 131 sends a message to ALL processes by the name A. It would find process A (111) in context 110, as well as process A (122) which is the context process for context 121.
A process may also send a message to itself or to its context process without knowing either name explicitly.
The concept of a "logical ring" (analogous to a LAN) allows a message to be sent to the NEXT process in the system with a given name. The message goes to exactly one process in the sender's context, if such a process exists. Otherwise the parent context is searched.
The virtual machine guarantees that each NEXT transmission will reach a different process and that eventually a transmission will be sent to the logically "first" process (the one that sent the original message) in the ring, completing the loop. In other words, all processes with the same name at the same level can communicate with each other without knowing how many there are or where they are located. The logical ring is essential for distributing services such as a data base. The ordering of processes in the ring is not predictable.
For example, if process a (125) in context 121 sends a message to process a using the NEXT primitive, the search finds a first process a (124) in the same context 121. Process a (124) is marked as having received the message, and then process a (124) sends the message on to the NEXT process a (123) in context 121. Process a (123) is marked as having received the message, and then it sends the message on to the NEXT process a, which is the original sender process a (125), which knows not to send it further on, since it's been marked as having already received the message.
Sending messages directly by PID obviates the need for a name search and ignores context boundaries. This is known as the DIRECT mode of transmission and is the most efficient. For example, process A (111) sends a message in the DIRECT mode to process y in context 141.
If a process sends a message in the LOCAL transmission mode, it sends it only to a process having the given name in the sender's own context.
In summary, including the DIRECT transmission mode, there are five transmission modes which can be used with the PUT, FORWARD, and CALL primitives:
ALL--to all processes with the given name in the first context which contains that name, starting with the sender's context and searching upwards through all parent contexts.
LOCAL--to all processes with the given name in the sender's context only.
NEXT--to the next process with the given name in the same context as the sender, if any; otherwise it searches upwards through all parent contexts until the name is found.
LEVEL--sends to "self" (the sending process) or to "context" (the context process corresponding to the sender's context); "self" cannot be used with CALL primitive.
DIRECT--sent by PID.
Messages are usually transmitted by queueing a pointer to the buffer containing the message. A message is only copied when there are multiple destinations or when the destination is on another cell.
Operating System
The operating system of the present invention consists of a kernel, which implements the primitives described above, plus a set of processes which provide process creation and termination, time management (set time, set alarm, etc.) and which perform cell start-up and configuration. Drivers for devices are also implemented as processes (EESP's), as described above. This allows both system services and device drivers to be added or replaced easily. The operating system also supports swapping and paging, although both are invisible to applications software.
Unlike known distributed computer systems, that of the present invention does not use a distinct "name server" process to resolve names. Name searching is confined to the kernel, which has the advantage of being much faster.
A minimal bootstrap program resides permanently (in ROM) on every cell, e.g. ROM 28 in cell N of FIG. 2. The bootstrap program executes automatically when a cell is powered up and begins by performing basic on-board diagnostics. It then attempts to find and start an initial system code module which comprises the entire kernel, and EESP's for the clock, disk (if required), and NIM (if required). The module is sought on the first disk drive on the cell, if any. If there isn't a disk, and the cell is on the LAN, a message will be sent out requesting the module. Failing that, the required software must be resident in ROM. System services for the clock and for process creation, an initialization program, and a minimal file system, are also built into the module. The initialization program sets up all of the kernel's internal tables and then calls predefined entry points in each of the preloaded services (file management, etc.). The net result is that EESP's for the attached devices are scheduled to run, and the cell is available.
In general, there exists a template file describing the initial software and hardware for each cell in the system. The template defines a set of initial processes (usually one per service) which are scheduled immediately after the cell start-up. These processes then start up their respective subsystems. A cell configuration service on each cell sends configuration messages to each subsystem when it is being initialized, informing it of the devices it owns. Thereafter, similar messages are sent whenever a new device is added to the cell or a device fails or is removed from the cell.
Thus there is no well-defined meaning for "system up" or "system down"--as long as any cell is active, the system as a whole may be considered to be "up". Cells can be shut down or started up dynamically without affecting other cells on the network. The same principle applies, in a limited sense, to peripherals. Devices which can identify themselves with regard to type, model number, etc. can be added or removed without operator intervention. The operating system cannot maintain a global status of the system, nor does it attempt to centralize control of the entire system.
Data Management
The present invention allows the user to store and retrieve data at several levels of abstraction. At various levels it provides device-independence, transparency, multiple views of the same data and support for transaction processing. Transparency means that a process need not know where a file is stored in order to access it. It also means that the file can be moved to another device without affecting the process. Only as many levels as are required for a particular application need be included in the system.
Referring now to FIG. 7, the lowest level of data management is the physical disk layer 153, which is completely hidden from all applications software 155. Immediately above this level are virtual disks 152 which define an interface in terms of linear arrays of 1K blocks, regardless of the actual medium. Although the usual medium is disk, RAM may also be used (for temporary files) to improve performance. Three types of messages are supported at this level: "initial", to format the virtual disk, and "read" and "write" to access specific blocks.
The third level, disk management 151, organizes data within a virtual disk by means of indices. A disk index is a file at this level and is viewed as an extensible linear array of bytes. Messages are accepted to initialize the disk, allocate and delete indices, and read and write indices. The later two functions operate starting at a given byte offset for a given byte length. An index is automatically extended when a request references a location outside the current limits. Physical storage is allocated only when data is actually written. Optional data caching is supported at the disk management level on a per cell basis.
File management 150 is layered on top of disk management 151 and introduces the concept of a "file system". A file system is a collection of named files (or named indices, in terms of the disk management layer 151). The name space constitutes a flat (single-level) directory which is allocated when the file system is initialized. A name may be up to 64 characters long and is hashed into the directory. Unnamed files are useful for building complex disk structures which are logically linked to each other, such as a hierarchical file directory or a database, or for temporary files which only the creator will use.
Transparency is supported only at the file management level 150 and above. It is used by simply omitting the file system name from the request (NEW, DELETE, RENAME, or OPEN). In this case, the request is forwarded through all file systems until the given file name is found.
The highest level 154 of data management deals in terms of "metaphors", which implement application-specific views of the data. A relational database is one example of a metaphor. Complex operations such as multi-user synchronization and record- or field-locking may be implemented at this level. The present invention supports two built-in views of the data: "plain" files, which are superficially equivalent to UNIX™ files, and a relational database.
FIG. 8 illustrates the design of the data management software up to the plain-file level. Each active (mounted) file system 165 is represented by a file management context 160. The set of all such contexts forms a logical ring for purposes of message transmission; in other words, they all have the same name ("file-- mgt"). The actual name of the file system (stored on the disk 166 at initialization) is known only to the context process.
In the plain-file metaphor, there is exactly one process for each open file, acting as a server for that file. That process (an instance of "fil-- access") can be located in the appropriate file management context, or any application can create its own private copy of the process. The process allows standard file management functions (NEW, DELETE, RENAME, OPEN, and CLOSE) plus SEEK, LOCK (lock the entire file against access by processes other than the owner) and UNLOCK. Note that a given file process is only opened once, by its owner. If not locked, any other processes which know its name or PID can read and write the file. Protection is provided through normal process name-scoping. Protection via passwords or a similar mechanism are in general unsupported unless supported by another metaphor.
Human Interface
The human interface (HI) of the present invention provides a set of tools with which an end user can construct a package specific to his applications requirements. Such a package is referred to as a "metaphor", since it reflects the user's particular view of the system. Multiple metaphors can be supported concurrently. One representative metaphor is, for example, a software development environment.
The purpose of the HI metaphor is to allow consistent, integrated access to the data and functions available in the system. Since user's perceptions of the system are based largely on the way they interact with it, it is important to provide an interface with which they feel comfortable. The HI allows a systems designer to create a model consisting of objects that are familiar to the end user and a set of actions that can be applied to them.
The fundamental concept of the HI is that of the "picture". All visually-oriented information, regardless of interpretation, is represented by pictures. A picture (such as a diagram, report, menu, icon, etc.) is defined in a device-independent format which is recognized and manipulated by all programs in the HI and all programs using the HI. It consists of "picture elements", such as "line", "arc", and "text", which can be stored compactly and transferred efficiently between processes. All elements have common attributes like color and fill pattern. Most also have type-specific attributes, such as typeface and style for text. Pictures are drawn in a large "world" co-ordinate system composed of "virtual pixels".
Because all data is in the form of pictures, segments of data can be freely copied between applications, e.g., from a live display to a word processor. No intermediate format or conversion is required. One consequence of this is that the end user or original equipment manufacturer (OEM) has complete flexibility in defining the formats of windows, menus, icons, error messages, help pages, etc. All such pictures are stored in a library rather than being built into the software and so are changeable at any time without reprogramming. A comprehensive editor is available to define and modify pictures on-line.
All interaction with the user's environment is through either "virtual input" or "virtual output" devices. A virtual input device accepts keyboards, mice, light pens, analog dials, pushbuttons, etc. and translates them into text, cursor-positioning, action, dial, switch, and number messages. All physical input devices must map into this set of standard messages. Only one process, an input manager for the specific device, is responsible for performing the translation. Other processes can then deal with the input without being dependent on its source.
Similarly, a virtual output manager translates standard output messages to the physical representation appropriate to a specific device (screen, printer, plotter, etc.) A picture drawn on any terminal or by a process can be displayed or printed on any device, subject to the physical limitations of that device.
With reference to FIG. 9, two "pictures" are illustrated--picture A (170) and picture B (174).
The concept of a "view" is used to map a particular rectangular area of a picture to a particular device. In FIG. 9, picture A is illustrated as containing at least one view 171, and picture B contains at least one view 175. Views can be used, for example, to partition a screen for multiple applications or to extract page-sized subsets of a picture for printing.
If the view appears on a screen it is contained in a "window". With reference again to FIG. 9, view 171 of picture A is mapped to screen 176 as window 177, and view 175 of picture B is mapped as window 178.
The HI allows the user to dynamically change the size of the window, move the window around on the screen, and move the picture under the window to view different parts of it (i.e., scroll in any direction). If a picture which is mapped to one or more windows changes, all affected views of that picture on all screens are automatically updated. There is no logical limit to the number or sizes of windows on a particular screen. Since the system is distributed, it's natural for pictures and windows to be on different cells. For example, several alarm displays can share a single, common picture.
The primary mechanism for interacting with the HI is to move the cursor to the desired object and "select" it by pressing a key or button. An action may be performed automatically upon selection or by further interaction, often using menus. For example, selecting an icon usually activates the corresponding application immediately. Selecting a piece of text is often followed by selection of a command such as "cut" or "underline". Actions can be dynamically mapped to function keys on a keyboard so that pressing a key is equivalent to selecting an icon or a menu item. A given set of cursors (the cursor changes as it moves from one application picture to another), windows, menus, icons, and function keys define a "metaphor".
The HI builds on the above concepts to provide a set of distributed services. These include electronic mail, which allows two or more users at different terminals to communicate with each other in real time or to queue files for later delivery, and a forms manager for data entry. A subclass of windows called "virtual terminals" provides emulation of standard commercially available terminals.
FIG. 10 shows the different levels of the HI and data flow through them. Arrows 201-209 indicate the most common paths, while arrows 210-213 indicate additional paths. The interface can be configured to leave out unneeded layers for customized applications. The philosophy behind the HI design dictates one process per object. That is, a process is created for each active window, picture, input or output device, etc. As a result, the processes are simplified and can be distributed across cells almost arbitrarily.
Error Management
An error management service is provided to catch errors and report them to the appropriate process(es). It serves as a foundation upon which more sophisticated diagnostics and/or recovery schemes may be constructed. The system can intercept processor internal exceptions (bus and address errors, "trap" instructions, etc.), external exceptions (such as a spurious interrupts), device faults, and software-defined errors. The latter category is open-ended and comprises unexpected termination of a process, the result of a diagnostic program, or in general any error detected by the kernel or by any process. Failure to find the destination of a transmitted message is one example. While internal exceptions can be associated with the particular process which caused the error, external exceptions are independent, although they may directly impact one or more processes.
In summary, the prime functions of the error management service are to: (1) classify and log errors, (2) generate notification messages, (3) accept requests to configure the service and specify options, (4) accept software error messages from other subsystems, and (5) terminate affected processes, if required. Item (3) above allows applications and services to indicate that they want to know about specific errors or classes of errors. Options include automatic logging, automatic display on the operator's terminal, automatic suspension (for debugging) or abortion of the offending process, and automatic dumping of the process image to a file. The default actions, if no options have been specified, are termination, logging and display. Any outstanding request can be cancelled at any time.
The HI logging service provides the facility to store error messages in a chronological file, maintain a hard-copy log, and create a dynamic display of errors, ordered by time, priority, class, etc. The debugger is often invoked upon occurrence of a process error to examine the process' state for clues.
DETAILED DESCRIPTION OF THE INVENTION
Referring now to FIG. 11, a block diagram is shown of a logical ring of file systems, illustrating how an access request to a file system is handled by the present invention. Each mounted disk volume in the distributed data processing system of the present invention constitutes a file system. Each file system is managed by a file management context whose architecture is represented by FIG. 8. On a relatively large system there may be any number of active file systems (i.e. active file management contexts), where each file management context has the name "file-- mgt". The set of these contexts is connected together in a logical ring, as shown in FIG. 11.
The name of file system is established when a disk volume is initialized. The file system name is written into the volume header on the disk. When a file management context starts up, it attempts to read the volume header of its associated disk. If successful, the volume name is read and becomes the name of the file system which that context manages. If unsuccessful, the volume is marked as uninitialized. Thereafter only an INITIAL command is accepted.
Within a file management context, requests which reference a file by name (NEW, DELETE, RENAME, OPEN, and CLOSE) are sent to the context process "file-- mgt". Requests which access data (READ and WRITE) are sent directly by their PID to the disk-- mgt process within the file management context. This PID, as well as the associated disk index, is returned in the reply to a successful NEW or OPEN command. This connects the user (e.g., a data management process) to a specific file allocation on a specific volume.
As shown in FIG. 11, all active file management contexts are viewed as forming a logical ring. Requests referencing a file by name are sent to the context process named "file-- mgt" using transmission mode NEXT. Each context process "file-- mgt" determines whether the request is for the file system which it manages, and, if it is not, it forwards the request to the next context "file-- mgt". If a request circulates the logical ring without success, then it is returned to the caller with an error indication.
In FIG. 11, assume that a user 300 (e.g. an application context) initiates a file access request to a certain "TEMP" file in file system "G" 306. The file access request is first received by the "file-- mgt" context process of file system "B" 302, which determines that the request is not for file system "B" and forwards it to file system "S" 304. Likewise, file system "S" 304 forwards the request on to file system "G" 306. The "file-- mgt" context process of file system "G" 306 recognizes that the request is intended for this file system and then responds to user 300 that it will attempt to satisfy the request.
Had the file access request circulated the entire loop without success, it would have returned to user 300 with an error message. To prevent the request from recirculating the loop, once a given file system (e.g. file system "B" 302) fails to satisfy the request, it records an indication that it has attempted to satisfy this particular request, so that it doesn't reattempt to satisfy the request on any wrap-around.
A file access request may either specify both a file system name and a file name, or it may simply specify a file name. Data residence transparency is achieved by not specifying the file system name. Suppose, for example, that user 300 doesn't know on which file system a desired file is located or doesn't care where a file is to be opened. In this case, an attempt is made by each successive "file-- mgt" context to satisfy the request of user 300. Thus the set of all disk volumes in the system may be considered one large disk space, and the user doesn't have to know on which file system any given file is logically or physically located.
For example, assume user 300 initiates a file access request to a file "ABC" without specifying the file system name. File system "B" 302 will first attempt to satisfy the request. However, if it's unable to, e.g. because of insufficient space, it forwards the request on to file system "S" 304. If file system "S" 304 is capable of satisfying the request, it so notifies user 300. Otherwise, the request continues on to each file system in turn until one is able to satisfy the request. If none is able to satisfy the request, an error message is returned to user 300. As mentioned above, once a file system fails to satisfy the request, it marks the attempt, so that it doesn't attempt to satisfy the request if the request circulates around the entire loop without being satisfied.
The flow diagram of FIG. 12 illustrates how a file access request is handled by the present invention. A file access request is received in block 320. Decision block 321 queries whether this is a wrap-around. If so, an error message is sent to the user, as indicated by block 322. If not, the procedure passes to decision block 323, which queries whether a file system has been specified. If not, this particular file system attempts to satisfy the request, as indicated by block 325. If so, decision block 324 queries whether this particular file system is the one specified. If so, this particular file system attempts to satisfy the request.
If this is not the file system specified, then the request is marked for wrap-around, as shown by block 328, and the request is forwarded to the next file system, as shown by block 329.
If the request can be satisfied (block 326), then the user is so informed (block 327). If not, decision block 330 queries whether a file system was specified. If so, an error message is sent to the user, as indicated by block 331. If not, the request is marked for wrap-around (block 328), and the request is forwarded to the next file system (block 329).
Appendix A contains a "C" language implementation of the flow diagram shown in FIG. 12.
Appendix B is a detailed description of the relevant portions of the source code listing of Appendix A.
It will be apparent to those skilled in the art that the herein disclosed invention may be modified in numerous ways and may assume many embodiments other than the preferred form specifically set out and described above. For example, a file system may obviously occupy some other physical device, or portion or grouping thereof, other than a disk volume, as disclosed above.
Accordingly, it is intended by the appended claims to cover all modifications of the invention which fall within the true spirit and scope of the invention. ##SPC1##
______________________________________                                    
APPENDIX B                                                                
Description of Program Listing                                            
Lines   Description                                                       
______________________________________                                    
26-29   Include configuration and definition                              
        parameters.                                                       
32-33   Type the return of these local functions.                         
36      Main entry point.                                                 
38-57   Locally defined variables (for the main                           
        program).                                                         
61-105  Initialization. This code is executed once                        
        when the process is first activated. It is not                    
        executed thereafter.                                              
62      Allocate a buffer to hold the disk volume                         
        table.                                                            
63      Call process `FMcreator` with a message whose                     
        function is "init". The reply is received in                      
        msg.                                                              
64      Create an instance of process `disk.sub.-- mgt`. This             
        will run as a child of this process                               
        (`file.sub.-- mgt`). The pid (process identifier) of              
        `disk.sub.-- mgt` is disk.sub.-- pid.                             
65      Copy the name in the reply message to variable                    
        disk.sub.-- name.                                                 
66      Send the reply message to process `disk.sub.-- mgt`.              
67      Clear the volume table (voltbl) to binary                         
        zeros.                                                            
68-69   Initialize some variables.                                        
70-74   Attempt to read the volume table from the                         
        currently mounted disk.                                           
75-78   If the read was successful and the length of                      
        the reply is ok and the id field is "+cX file                     
        system+", then mark this file system as                           
        initialized. Otherwise mark it as                                 
        uninitialized.                                                    
85-86   If not initialized, then use `disk.sub.-- name` as the            
        current file system name.                                         
88-91   Read the root node in the directory. Note.                        
        The directory on a cX file system is                              
        hierarchical; i.e., has the structure of a tree.                  
94-105  Close any files which are still open. Note.                       
        This initialization code is only executed when                    
        the system is booted, therefore if files are                      
        still open then the system must have crashed.                     
111     This is the main loop. The program loops                          
        "forever" receiving requests, processing                          
        requests and then recycling.                                      
112     Wait until a request from a user is received.                     
113-116 If the supplied file pathname does not begin                      
        with `/`, then reply immediately to the user                      
        with the message "Pathnames must be full".                        
        Jump then back to the head of the loop.                           
117-124 Search the file directory and find the                            
        directory node associated with the supplied                       
        pathname. Also parse the file.sub.-- system name and              
        return it. Also, if the function is to create                     
        a new file or directory then return that new                      
        name in `file`. If the search was unsuccessful                    
        and the file system name was supplied, then                       
        return an error to the user with the message                      
        "File not found". If the search was                               
        unsuccessful and the file system name was not                     
        found then mark the message if necessary and                      
        forward the message to the next file system.                      
125-126 Convert the specified function to an integer                      
        value and switch on that value. Each of the                       
        successive "case" statements is one of those                      
        possible values.                                                  
132-147 Initialize the file system. If successful mark                    
        initialization as TRUE. Otherwise mark it                         
        FALSE. The work here is done in function                          
        `vol.sub.-- init`, line 897-979.                                  
153-236 Create a new data file.                                           
161-164 Make sure the referenced directory in which the                   
        new data file will be created is indeed a                         
        directory (and not itself a data file).                           
165-171 If the name of the file to be created was                         
        supplied, then see if it already exists in this                   
        directory. If it does and is open then return                     
        the error "File exists and is currently open".                    
        If it does and isn't the file will be deleted                     
        before being recreated.                                           
171-184 Allocate a new disk file. If successful, reply                    
        to the user or forward the request to the next                    
        file system based on whether in transparent                       
        mode.                                                             
185-187 If the file already existed, delete it.                           
189-194 If the file name was not supplied then create                     
        it for the user (as the concatenation of the                      
        index of the new file and the file system                         
        name).                                                            
200-207 Build the new directory node.                                     
208     Write the new directory node.                                     
209-221 The write was successful. Build the reply                         
        message to the user and send it.                                  
223-234 The write was unsuccessful. Delete the                            
        allocated disk file and either error reply to                     
        the user or forward the request.                                  
242-287 Rename an existing file.                                          
250     Search for the file to be renamed. Note.                          
        Function `findir` above has already found the                     
        directory in which this file should be                            
        found.                                                            
251-255 The file was found. If it is an open data file                    
        then error reply the user with "File is                           
        currently open".                                                  
256     Search for the directory in which the new name                    
        is to be installed.                                               
258-261 If not found error reply with "Rename directory                   
        not found".                                                       
262-265 If it is not a directory error reply with "Not                    
        a directory".                                                     
266-269 If file rename not supplied then error reply                      
        with "Must specify rename file name".                             
270     Search for the file we are renaming to.                           
271-274 If it exists then error reply with "Rename file                   
        already exists".                                                  
275-278 Delete the old directory node and create and                      
        write the new directory node.                                     
280-285 Rename directory could not be found. Either                       
        error reply or forward the request.                               
292-311 Delete a data file.                                               
300-303 If the specified file is a directory error reply                  
        with "File is a directory".                                       
304-307 If specified file is open error reply with                        
        "File is currently open".                                         
308     Delete the file.                                                  
317-361 Open a data file.                                                 
325-328 If specified file is a directory error reply                      
        with "File is a directory".                                       
329-334 If supplied access mode is not one of                             
        "exclusive", "readwrite" or "readonly" then                       
        error reply with "invalid mode".                                  
335-340 If the file already open in exclusive mode, or                    
        the requested mode is "exclusive" and the file                    
        is open in some mode, or the file is open in                      
        readwrite mode and the requested mode is                          
        "readwrite" then error reply with "File is                        
        open; modes incompatible".                                        
341-342 Set the requested access mode in the directory                    
        entry.                                                            
343     Increment the access count.                                       
344     If the access mode is not "readonly" then save                    
        the pid of the user.                                              
345     Rewrite the directory entry.                                      
346-358 Build the reply to the user and send it.                          
367-394 Close a data file to access.                                      
375-378 If the file is not open error reply with "File                    
        not open".                                                        
379-380 Adjust access mode as specified.                                  
381-383 The ability to close a file based on the                          
        owner's pid is not supported yet.                                 
388-389 Unmark owner pid and decrement access count.                      
390     Save the current time as the last access time                     
        to this file.                                                     
391     Rewrite the directory entry.                                      
392     Reply to the user.                                                
399-462 Query the file system. This function returns                      
        certain status information to the user. The                       
        available modes are "filesiz", "syssiz",                          
        "freesiz" and "volsiz". Each of these is                          
        requested of process `disk.sub.-- mgt`. The result is             
        returned to the user. Mode "filesiz" returns                      
        the size of the referenced file in virtual disk                   
        blocks. Mode "syssiz" returns the total number                    
        of allocated virtual disk blocks. Mode                            
        "freesiz" returns the total number of available                   
        disk blocks. Mode "volsiz" returns the total                      
        number of virtual disk blocks comprising this                     
        file system.                                                      
468-500 Create a new directory.                                           
473     Search for the specified new directory name.                      
474-478 If it already exists and is a data file                           
        then error reply with "Data file of same name                     
        exists".                                                          
479-482 If it exists and is directory and is not empty                    
        then error reply with "Directory exists and is                    
        not empty".                                                       
483     If it exists and is a directory and is empty                      
        generate a good reply to the user. (As if he                      
        has just created it.)                                             
486-498 Build the new directory entry and write it. If                    
        the new directory name was not supplied then                      
        error reply with "Directory name must be                          
        specified".                                                       
506-524 Delete a directory.                                               
511-514 If the referenced file is not a directory then                    
        error reply with "Not a directory".                               
515-518 If the directory is not empty then error reply                    
        with "Not an empty directory".                                    
519-523 Delete the directory.                                             
530-561 Return a list of the files contained within a                     
        subdirectory.                                                     
535-538 If the referenced file is not a directory error                   
        reply with "Not a directory".                                     
539-540 Preallocate and initialize the reply message.                     
542-557 Copy the directory entry of each child file                       
        into the reply message.                                           
558     Send the reply message back to the user.                          
566-583 Turn on or off the debug trace facility. This                     
        function is only used when the file system is                     
        being debugged.                                                   
588-605 Either the request message has wrapped around                     
        the logical ring or it references a different                     
        file system. Either reply to the user with an                     
        appropriate error message or forward the request                  
        to the next file system.                                          
611-617 The specified function cannot be recognized.                      
        Reply to the user with "Unknown function".                        
629-979 These are attached functions (subroutines).                       
629-659 Check to see if the request message has wrapped                   
        around. Copy the `mode` field in the message into                 
        a main program variable. Convert the supplied                     
        function (in ASCII) into an integer and return it                 
        as the function value.                                            
668-729 Find the directory entry referenced by the                        
        supplied pathname and copy it into a main program                 
        variable. Parse out the referenced file system                    
        name and copy it into a main program variable. If                 
        the function is "new", "newdir", "initial" or                     
        "rename" then don't include the last file name in                 
        the pathname in the search. If anything here                      
        fails return FALSE; otherwise return TRUE.                        
736-751 Given the directory entry of a directory file,                    
        search its children for a file of the supplied                    
        name. If it exists copy the associated child                      
        directory into a main program variable and return                 
        TRUE. Otherwise return FALSE.                                     
759-810 Delete the specified directory entry. If it is a                  
        non-empty directory return FALSE. If it is a data                 
        file delete the associated disk file. Dequeue the                 
        directory entry from the directory and return it                  
        to the free list. Return FALSE if anything fails                  
        and TRUE otherwise.                                               
818-854 Given the parent directory entry install a child                  
        node for it. This fails only if there are no more                 
        directory entries on the free list.                               
862-870 Read the specified directory entry from the                       
        directory file.                                                   
878-888 Write the specified directory entry to the                        
        directory file.                                                   
897-979 Initialize the file system. This consists of the                  
        following. The disk is initialized, consisting of                 
        formatting it and writing certain tables and                      
        pointers, returning all virtual disk blocks to                    
        the free list. The volume table is built and                      
        written. The directory is built and written. The                  
        first entry is the root. The second entry is the                  
        directory file itself. The third and following                    
        entries are placed on a free list.                                
______________________________________                                    

Claims (8)

What is claimed is:
1. A method of providing file system access in a data management system used in a data processing system comprising at least one processor, at least one memory storage unit coupled to said at least one processor, and a plurality of individual file systems and a requesting process contained in said at least one memory storage unit, said method comprising the steps of:
(a) generating an access request by said requesting process for a file having a given file name in one of said file systems having a given file system name, said access request specifying said file name and said file system name;
(b) transmitting said access request to one of said file systems;
(c) determining whether said file system has said specified file system name, and, if so, proceeding with step (e), but if not, automatically forwarding said access request to a different file system;
(d) repeating step (c) until either said file system with said specified file system name is located, in which case proceeding with step (e), or until said access request has been received by all of said file systems without locating said file system with said specified file system name and in such case generating an indication of an unsuccessful access to said file to said requesting process; and
(e) determining whether said access request can be satisfied by said file system with said specified file system name, and, if so, satisfying said access request and generating an indication thereof directly to said requesting process, but if not, generating an indication of an unsuccessful access to said file to said requesting process.
2. The method of providing file system access recited in claim 1, wherein in steps (b) and (c) said access request is always forwarded to said file systems in a predetermined order.
3. A method of providing file system access in a data management system used in a data processing system comprising a plurality of processors interconnected by a network, a plurality of memory storage units, each processor being coupled to at least one memory storage unit, and a plurality of individual file systems and a requesting process contained in at least one memory storage unit, said method comprising the steps of:
(a) generating an access request by said requesting process for a file having a given file name in one of said file systems having a given file system name, said access request specifying said file name and said file system name;
(b) transmitting said access request to one of said file systems;
(c) determining whether said file system has said specified file system name, and, if so, proceeding with step (e), but if not, automatically forwarding said access request to a different file system;
(d) repeating step (c) until either said file system with said specified file system name is located, in which case proceeding with step (e), or until said access request has been received by all of said file systems without locating said file system with said specified file system name and in such case generating an indication of an unsuccessful access to said file to said requesting process; and
(e) determining whether said access request can be satisfied by said file system with said specified file system name, and, if so, satisfying said access request and generating an indication thereof directly to said requesting process, but if not, generating an indication of an unsuccessful access to said file to said requesting process.
4. The method of providing file system access recited in claim 3, wherein in steps (b) and (c) said access request is forward to said file systems in a predetermined order.
5. A data management system for use in a data processing system comprising:
at least one processor for executing instructions;
at least one memory storage unit coupled to said at least one processor, said memory storage unit storing instructions and data;
a plurality of individual file systems contained in said at least one memory storage unit;
means responsive to the execution of an instruction by said at least one processor for generating an access request for a file having a given file name in at least one of said file systems having a specified file system name, said access request specifying said file name and said file system name;
means responsive to said access request generating means for transmitting said access request to one of said file systems;
first means responsive to the receipt of said access request for determining whether said one file system has said specified file system name, and, if so, generating a first control signal, but if not, generating a second control signal;
second means responsive to said first control signal for determining whether said access request can be satisfied by said file system having said specified file system name, and, if so, for satisfying said access request and generating a first indication of a successful access to said file directly to said at least one processor, and, if not, for generating a second indication of an unsuccessful access to said file;
third means responsive to said access request generating means, to said second control signal, and to said second indication for automatically forwarding said access request to successive, different file systems whereby:
(a) if said access request is forwarded to a file system having said specified file system name, said first control signal is generated by said first means, in which case said second means either generates said first indication or said second indication, depending upon whether said file is successfully or unsuccessfully accessed, respectively, and
(b) if said access request is forwarded to a file system not having said specified file system name, said first means generates said second control signal,
said third means ceasing to forward said access request after all of said file systems have been unsuccessful accessed and generating a third indication of an unsuccessfully access to said file directly to said at least one processor.
6. The data management system recited in claim 5, and further comprising means responsive to said access request generating means and to said access request forwarding means for forwarding said access request to said file systems in a predetermined pattern.
7. A data management system for use in a data processing system comprising:
a plurality of processors for executing instructions, said processors being interconnected by a network;
a plurality of memory storage units, each said processor being coupled to at least one of said memory storage units, said memory storage units storing instructions and data;
a plurality of individual file systems contained in at least one of said memory storage units;
means responsive to the execution of an instruction by one of said processors for generating an access request for a file having a given file name in at least one of said file systems having a specified file system name, said access request specifying said file name and said file system name;
means responsive to said access request generating means for transmitting said access request to one of said file systems;
first means responsive to the receipt of said access request for determining whether said one file system has said specified file system name, and, if so, generating a first control signal, but if not, generating a second control signal;
second means responsive to said first control signal for determining whether said access request can be satisfied by said file system having said specified file system name, and, if so, for satisfying said access request and generating a first indication of a successful access to said file directly to said one of said processors, and, if not, for generating a second indication of an unsuccessful access to said file;
third means responsive to said access request generating means, to said second control signal, and to said second indication for automatically forwarding said access request to successive, different file systems whereby:
(a) if said access request is forwarded to a file system having said specified file system name, said first control signal is generated by said first means, in which case said second means either generates said first indication or said second indication, depending upon whether said file is successfully or unsucessfully accessed, respectively, and
(b) if said access request is forwarded to a file system not having said specified file system name, said first means generates said second control signal,
said third means ceasing to forward said access request after all of said file systems have been unsuccessful accessed and generating a third indication of an unsuccessfully access to said file directly to said one of said processors.
8. The data management system recited in claim 7, and further comprising means responsive to said access request generating means and to said access request forwarding means for forwarding said access request to said file systems in a predetermined pattern.
US07/300,687 1985-05-06 1989-01-19 System for locating a file in a logical ring by sequentially forwarding access request with file system name and file name Expired - Fee Related US5014192A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US07/300,687 US5014192A (en) 1985-05-06 1989-01-19 System for locating a file in a logical ring by sequentially forwarding access request with file system name and file name

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US73092985A 1985-05-06 1985-05-06
US11061487A 1987-10-19 1987-10-19
US07/300,687 US5014192A (en) 1985-05-06 1989-01-19 System for locating a file in a logical ring by sequentially forwarding access request with file system name and file name

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US11061487A Continuation 1985-05-06 1987-10-19

Publications (1)

Publication Number Publication Date
US5014192A true US5014192A (en) 1991-05-07

Family

ID=27380888

Family Applications (1)

Application Number Title Priority Date Filing Date
US07/300,687 Expired - Fee Related US5014192A (en) 1985-05-06 1989-01-19 System for locating a file in a logical ring by sequentially forwarding access request with file system name and file name

Country Status (1)

Country Link
US (1) US5014192A (en)

Cited By (63)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1991014993A1 (en) * 1990-03-27 1991-10-03 Sun Microsystems, Inc. Locking mechanism for the prevention of race conditions
US5144557A (en) * 1990-08-13 1992-09-01 International Business Machines Corporation Method and system for document distribution by reference to a first group and particular document to a second group of user in a data processing system
US5148527A (en) * 1988-12-23 1992-09-15 International Business Machines Corporation Interface for independently establishing a link and transmitting high level commands including logical addresses from dedicated microprocessor to shared intelligent memory
US5175848A (en) * 1988-04-25 1992-12-29 Dysart John A Method for copying linked data objects with selective copying of children objects and using a link table to record object linkages
US5222242A (en) * 1990-09-28 1993-06-22 International Business Machines Corp. System for locating a node containing a requested resource and for selectively verifying the presence of the resource at the node
US5247615A (en) * 1989-12-21 1993-09-21 Hitachi, Ltd. Control method and system for establishing a connection among terminals forming a joint project information processing system
US5287537A (en) * 1985-11-15 1994-02-15 Data General Corporation Distributed processing system having plural computers each using identical retaining information to identify another computer for executing a received command
US5293635A (en) * 1991-04-30 1994-03-08 Hewlett-Packard Company Detection on a network by a mapping application of a relative location of a first device to a second device
US5301339A (en) * 1986-12-16 1994-04-05 Hollandse Signaalapparaten B.V. System for dynamic communication among subsystems implementing data requests by data type and locating data by data type matching
US5341478A (en) * 1990-08-14 1994-08-23 Digital Equipment Corporation Methods and apparatus for providing dynamic invocation of applications in a distributed heterogeneous environment
US5379423A (en) * 1988-09-28 1995-01-03 Hitachi, Ltd. Information life cycle processor and information organizing method using it
US5388213A (en) * 1990-06-06 1995-02-07 Apple Computer, Inc. Method and apparatus for determining whether an alias is available to uniquely identify an entity in a communications system
US5410688A (en) * 1989-07-21 1995-04-25 Hewlett-Packard Company Distributed object based systems for communicating object data among different storage domains
US5440744A (en) * 1990-08-14 1995-08-08 Digital Equipment Corporation Methods and apparatus for implementing server functions in a distributed heterogeneous environment
US5465365A (en) * 1992-12-31 1995-11-07 At&T Corp. Apparatus and methods for making a portion of a first name space available as a portion of a second name space
US5497492A (en) * 1990-09-04 1996-03-05 Microsoft Corporation System and method for loading an operating system through use of a fire system
US5546540A (en) * 1991-01-14 1996-08-13 Concord Communications, Inc. Automatic topology monitor for multi-segment local area network
US5548729A (en) * 1991-06-21 1996-08-20 Matsushita Electric Industrial Co., Ltd. System for automatically generating and saving control information in a server if requested by a client at system initialization for operating in a network
US5561799A (en) * 1993-06-17 1996-10-01 Sun Microsystems, Inc. Extensible file system which layers a new file system with an old file system to provide coherent file data
US5566326A (en) * 1993-09-28 1996-10-15 Bull Hn Information Systems Inc. Copy file mechanism for transferring files between a host system and an emulated file system
US5590330A (en) * 1994-12-13 1996-12-31 International Business Machines Corporation Method and system for providing a testing facility in a program development tool
US5619710A (en) * 1990-08-14 1997-04-08 Digital Equipment Corporation Method and apparatus for object-oriented invocation of a server application by a client application
US5635703A (en) * 1995-03-20 1997-06-03 Fujitsu Limited Card storage medium having a multi-application support function
US5666533A (en) * 1991-09-06 1997-09-09 International Business Machines Corporation Program execution management using process enclaves which define the scope of high-level language semantics and threads improving cooperation between processes written in multiple languages
US5687366A (en) * 1995-05-05 1997-11-11 Apple Computer, Inc. Crossing locale boundaries to provide services
US5790770A (en) * 1995-07-19 1998-08-04 Fujitsu Network Communications, Inc. Method and apparatus for reducing information loss in a communications network
US5813008A (en) * 1996-07-12 1998-09-22 Microsoft Corporation Single instance storage of information
US5898671A (en) * 1995-09-14 1999-04-27 Fujitsu Network Communications, Inc. Transmitter controlled flow control for buffer allocation in wide area ATM networks
US5920691A (en) * 1989-07-31 1999-07-06 Kabushiki Kaisha Toshiba Computer network system for collecting distributed management information
US5920541A (en) * 1990-01-12 1999-07-06 Sony Corporation Data disc having both data and data retrieval information stored thereon and method for retrieving data recorded on the data disc
US5991298A (en) * 1996-01-16 1999-11-23 Fujitsu Network Communications, Inc. Reliable and flexible multicast mechanism for ATM networks
US6067581A (en) * 1998-01-20 2000-05-23 Micron Electronics, Inc. Method for identifying the orignal source device in a transaction request initiated from address translator to memory control module and directly performing the transaction therebetween
US6081812A (en) * 1998-02-06 2000-06-27 Ncr Corporation Identifying at-risk components in systems with redundant components
US6247077B1 (en) 1998-02-06 2001-06-12 Ncr Corporation Highly-scalable parallel processing computer system architecture
US6249877B1 (en) * 1985-10-30 2001-06-19 Hitachi, Ltd. Method and apparatus for recovering data for a file in a plurality of equipments
US6286042B1 (en) * 1995-10-09 2001-09-04 Telefonaktiebolaget Lm Ericsson (Publ) System and method for communications management with redundancy
US6301645B1 (en) 1998-01-20 2001-10-09 Micron Technology, Inc. System for issuing device requests by proxy
US6421684B1 (en) * 1998-06-12 2002-07-16 Microsoft Corporation Persistent volume mount points
US20020133526A1 (en) * 2001-03-15 2002-09-19 International Business Machines Corporation Method to control alternative application operation based on results of an ordered application execution attempt
US20020188650A1 (en) * 2001-06-07 2002-12-12 Intel Corporation Fault-tolerant system and methods with trusted message acknowledgement
US20030067622A1 (en) * 1995-03-06 2003-04-10 Masushita Electric Industrial Co., Ltd Communication apparatus
US20030126118A1 (en) * 2002-01-02 2003-07-03 International Business Machines Corporation Method, system and program for direct client file access in a data management system
US6614891B2 (en) 1995-03-06 2003-09-02 Matsushita Electric Industrial Co., Ltd. Electronic-mail apparatus
US20030229656A1 (en) * 2002-06-07 2003-12-11 Network Appliance, Inc. Multiple concurrent active file systems
US6711632B1 (en) 1998-08-11 2004-03-23 Ncr Corporation Method and apparatus for write-back caching with minimal interrupts
US20040139097A1 (en) * 1995-04-11 2004-07-15 Kinetech, Inc. Identifying data in a data processing system
US6778287B1 (en) 1995-03-06 2004-08-17 Matsushita Electric Industrial Co., Ltd. Electronic mail system
US20040227972A1 (en) * 2003-05-14 2004-11-18 Canon Kabushiki Kaisha Printing apparatus and canceling method
US20050177832A1 (en) * 1998-11-24 2005-08-11 Microsoft Corporation System and method for terminating applications
US20050216624A1 (en) * 2002-09-26 2005-09-29 Guoshun Deng Device and method for providing data exchange and storage
US20050223223A1 (en) * 2004-04-01 2005-10-06 Fujitsu Limited Authentication apparatus and authentication method
US20060136988A1 (en) * 2000-05-02 2006-06-22 Microsoft Corporation Resource Manager Architecture Utilizing a Policy Manager
US7111297B1 (en) * 2000-05-02 2006-09-19 Microsoft Corporation Methods and architectures for resource management
US7137119B1 (en) 2000-05-02 2006-11-14 Microsoft Corporation Resource manager architecture with resource allocation utilizing priority-based preemption
US20070220116A1 (en) * 2006-03-14 2007-09-20 Anthony Rose Filter for a Distributed Network
US7284244B1 (en) 2000-05-02 2007-10-16 Microsoft Corporation Resource manager architecture with dynamic resource allocation among multiple configurations
US7337446B2 (en) 2000-05-02 2008-02-26 Microsoft Corporation Resource manager architecture
US20080250145A1 (en) * 2001-06-07 2008-10-09 Intel Corporation, Inc. Apparatus and computer-readable media for recoverable workflow
US7596563B1 (en) * 1999-10-28 2009-09-29 Hewlett-Packard Development Company, L.P. Computerized file system and method
US20100145995A1 (en) * 2004-03-02 2010-06-10 Cameron Donald F Object storage
US9798567B2 (en) 2014-11-25 2017-10-24 The Research Foundation For The State University Of New York Multi-hypervisor virtual machines
EP3798859A1 (en) * 2019-09-26 2021-03-31 Citrix Systems Inc. File system using approximate membership filters
US11809891B2 (en) 2018-06-01 2023-11-07 The Research Foundation For The State University Of New York Multi-hypervisor virtual machines that run on multiple co-located hypervisors

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4366479A (en) * 1980-02-08 1982-12-28 Hitachi, Ltd. Control information communication method and system through a common signal transmission line
US4477881A (en) * 1980-12-10 1984-10-16 Hitachi, Ltd. Method of retrieving and editing distributed information
US4510492A (en) * 1981-04-08 1985-04-09 Hitachi, Ltd. Message communication method and system
US4543630A (en) * 1981-04-01 1985-09-24 Teradata Corporation Data processing systems and methods
US4590468A (en) * 1983-03-10 1986-05-20 Western Digital Corporation Token access controller protocol and architecture
US4612541A (en) * 1982-10-27 1986-09-16 Tokyo Shibaura Denki Kabushiki Kaisha Data transmission system having high-speed transmission procedures
US4644468A (en) * 1984-07-20 1987-02-17 International Business Machines Corp. Name usage support through distributed processing networks linked by bridges and/or gateways
US4644470A (en) * 1984-07-20 1987-02-17 International Business Machines Corp. Non-unique names for broadcast messages
US4649535A (en) * 1985-05-13 1987-03-10 General Electric Company Method and apparatus for maintaining a dynamic logical ring in a token passing LAN
US4682326A (en) * 1985-11-27 1987-07-21 General Electric Company Method and apparatus for maintaining a dynamic logical ring in a token passing lan
US4698629A (en) * 1982-10-22 1987-10-06 Hitachi, Ltd. Method and apparatus for coordination among distributed subsystems

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4366479A (en) * 1980-02-08 1982-12-28 Hitachi, Ltd. Control information communication method and system through a common signal transmission line
US4366479B1 (en) * 1980-02-08 1992-03-10 Hitachi Ltd
US4477881A (en) * 1980-12-10 1984-10-16 Hitachi, Ltd. Method of retrieving and editing distributed information
US4543630A (en) * 1981-04-01 1985-09-24 Teradata Corporation Data processing systems and methods
US4510492A (en) * 1981-04-08 1985-04-09 Hitachi, Ltd. Message communication method and system
US4698629A (en) * 1982-10-22 1987-10-06 Hitachi, Ltd. Method and apparatus for coordination among distributed subsystems
US4612541A (en) * 1982-10-27 1986-09-16 Tokyo Shibaura Denki Kabushiki Kaisha Data transmission system having high-speed transmission procedures
US4590468A (en) * 1983-03-10 1986-05-20 Western Digital Corporation Token access controller protocol and architecture
US4644468A (en) * 1984-07-20 1987-02-17 International Business Machines Corp. Name usage support through distributed processing networks linked by bridges and/or gateways
US4644470A (en) * 1984-07-20 1987-02-17 International Business Machines Corp. Non-unique names for broadcast messages
US4649535A (en) * 1985-05-13 1987-03-10 General Electric Company Method and apparatus for maintaining a dynamic logical ring in a token passing LAN
US4682326A (en) * 1985-11-27 1987-07-21 General Electric Company Method and apparatus for maintaining a dynamic logical ring in a token passing lan

Non-Patent Citations (6)

* Cited by examiner, † Cited by third party
Title
Ebrahimi et al. "File Name Mapping Method Permitting Network Location Transparency", IBM TDB vol. 26, No. 7B, Dec. 1983, pp. 3791-3794.
Ebrahimi et al. File Name Mapping Method Permitting Network Location Transparency , IBM TDB vol. 26, No. 7B, Dec. 1983, pp. 3791 3794. *
IEE Proceedings, vol. 131, No. 2 Part E, Section A I, Mar. 1984, pp. 38 44, Old Woking, Surrey, G.B., R. Hull et al., Virtual Resource Ring . *
IEE Proceedings, vol. 131, No. 2 Part E, Section A-I, Mar. 1984, pp. 38-44, Old Woking, Surrey, G.B., R. Hull et al., "Virtual Resource Ring".
The 1st Int l Conf. on Computer Communication, Washington, 24th 26th Oct. 1972, pp. 364 370, A.C.M., N.Y., D. J. Farber et al., The Structure of a Distributed Computer System . *
The 1st Int'l Conf. on Computer Communication, Washington, 24th-26th Oct. 1972, pp. 364-370, A.C.M., N.Y., D. J. Farber et al., "The Structure of a Distributed Computer System".

Cited By (121)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6249877B1 (en) * 1985-10-30 2001-06-19 Hitachi, Ltd. Method and apparatus for recovering data for a file in a plurality of equipments
US5287537A (en) * 1985-11-15 1994-02-15 Data General Corporation Distributed processing system having plural computers each using identical retaining information to identify another computer for executing a received command
US5301339A (en) * 1986-12-16 1994-04-05 Hollandse Signaalapparaten B.V. System for dynamic communication among subsystems implementing data requests by data type and locating data by data type matching
US5175848A (en) * 1988-04-25 1992-12-29 Dysart John A Method for copying linked data objects with selective copying of children objects and using a link table to record object linkages
US5379423A (en) * 1988-09-28 1995-01-03 Hitachi, Ltd. Information life cycle processor and information organizing method using it
US5148527A (en) * 1988-12-23 1992-09-15 International Business Machines Corporation Interface for independently establishing a link and transmitting high level commands including logical addresses from dedicated microprocessor to shared intelligent memory
US5410688A (en) * 1989-07-21 1995-04-25 Hewlett-Packard Company Distributed object based systems for communicating object data among different storage domains
US5920691A (en) * 1989-07-31 1999-07-06 Kabushiki Kaisha Toshiba Computer network system for collecting distributed management information
US5247615A (en) * 1989-12-21 1993-09-21 Hitachi, Ltd. Control method and system for establishing a connection among terminals forming a joint project information processing system
US5920541A (en) * 1990-01-12 1999-07-06 Sony Corporation Data disc having both data and data retrieval information stored thereon and method for retrieving data recorded on the data disc
WO1991014993A1 (en) * 1990-03-27 1991-10-03 Sun Microsystems, Inc. Locking mechanism for the prevention of race conditions
US5095423A (en) * 1990-03-27 1992-03-10 Sun Microsystems, Inc. Locking mechanism for the prevention of race conditions
US5388213A (en) * 1990-06-06 1995-02-07 Apple Computer, Inc. Method and apparatus for determining whether an alias is available to uniquely identify an entity in a communications system
US5144557A (en) * 1990-08-13 1992-09-01 International Business Machines Corporation Method and system for document distribution by reference to a first group and particular document to a second group of user in a data processing system
US5341478A (en) * 1990-08-14 1994-08-23 Digital Equipment Corporation Methods and apparatus for providing dynamic invocation of applications in a distributed heterogeneous environment
US5440744A (en) * 1990-08-14 1995-08-08 Digital Equipment Corporation Methods and apparatus for implementing server functions in a distributed heterogeneous environment
US5619710A (en) * 1990-08-14 1997-04-08 Digital Equipment Corporation Method and apparatus for object-oriented invocation of a server application by a client application
US5497492A (en) * 1990-09-04 1996-03-05 Microsoft Corporation System and method for loading an operating system through use of a fire system
US5222242A (en) * 1990-09-28 1993-06-22 International Business Machines Corp. System for locating a node containing a requested resource and for selectively verifying the presence of the resource at the node
US5546540A (en) * 1991-01-14 1996-08-13 Concord Communications, Inc. Automatic topology monitor for multi-segment local area network
US5293635A (en) * 1991-04-30 1994-03-08 Hewlett-Packard Company Detection on a network by a mapping application of a relative location of a first device to a second device
US5548729A (en) * 1991-06-21 1996-08-20 Matsushita Electric Industrial Co., Ltd. System for automatically generating and saving control information in a server if requested by a client at system initialization for operating in a network
US5666533A (en) * 1991-09-06 1997-09-09 International Business Machines Corporation Program execution management using process enclaves which define the scope of high-level language semantics and threads improving cooperation between processes written in multiple languages
US6073157A (en) * 1991-09-06 2000-06-06 International Business Machines Corporation Program execution in a software run-time environment
US5465365A (en) * 1992-12-31 1995-11-07 At&T Corp. Apparatus and methods for making a portion of a first name space available as a portion of a second name space
US5561799A (en) * 1993-06-17 1996-10-01 Sun Microsystems, Inc. Extensible file system which layers a new file system with an old file system to provide coherent file data
US5566326A (en) * 1993-09-28 1996-10-15 Bull Hn Information Systems Inc. Copy file mechanism for transferring files between a host system and an emulated file system
US5590330A (en) * 1994-12-13 1996-12-31 International Business Machines Corporation Method and system for providing a testing facility in a program development tool
US6614891B2 (en) 1995-03-06 2003-09-02 Matsushita Electric Industrial Co., Ltd. Electronic-mail apparatus
US6844938B1 (en) * 1995-03-06 2005-01-18 Matsushita Electric Industrial Co., Ltd. Electronic mail apparatrus and method
US6826266B2 (en) 1995-03-06 2004-11-30 Matsushita Electric Industrial Co., Ltd. Electronic-mail apparatus
US20030067622A1 (en) * 1995-03-06 2003-04-10 Masushita Electric Industrial Co., Ltd Communication apparatus
US6885470B1 (en) 1995-03-06 2005-04-26 Matsushita Electric Industrial Co., Ltd. Electronic mail system
US6963634B2 (en) 1995-03-06 2005-11-08 Matsushita Electric Industrial Co., Ltd. Electronic-mail apparatus
US7119918B2 (en) 1995-03-06 2006-10-10 Matsushita Electric Industrial Co., Ltd. Communication apparatus
US6778287B1 (en) 1995-03-06 2004-08-17 Matsushita Electric Industrial Co., Ltd. Electronic mail system
US5635703A (en) * 1995-03-20 1997-06-03 Fujitsu Limited Card storage medium having a multi-application support function
US8082262B2 (en) * 1995-04-11 2011-12-20 Personalweb Technologies, LLC Methods, systems, and devices supporting data access in a data processing system
US7802310B2 (en) 1995-04-11 2010-09-21 Kinetech, Inc. Controlling access to data in a data processing system
US20080082551A1 (en) * 1995-04-11 2008-04-03 Kinetech, Inc. Content delivery network
US20080066191A1 (en) * 1995-04-11 2008-03-13 Kinetech, Inc. Controlling access to data in a data processing system
US20070185848A1 (en) * 1995-04-11 2007-08-09 Kinetech, Inc. Accessing data in a data processing system
US7945544B2 (en) 1995-04-11 2011-05-17 Kinetech, Inc. Similarity-based access control of data in a data processing system
US7945539B2 (en) 1995-04-11 2011-05-17 Kinetech, Inc. Distributing and accessing data in a data processing system
US7949662B2 (en) 1995-04-11 2011-05-24 Kinetech, Inc. De-duplication of data in a data processing system
US20050114296A1 (en) * 1995-04-11 2005-05-26 Savvis, Inc. Content delivery network and associated methods and mechanisms
US20110196894A1 (en) * 1995-04-11 2011-08-11 Kinetech, Inc. Accessing data in a data processing system
US8001096B2 (en) 1995-04-11 2011-08-16 Kinetech, Inc. Computer file system using content-dependent file identifiers
US20110225177A1 (en) * 1995-04-11 2011-09-15 Kinetech, Inc. Accessing Data In A Content-Addressable Data Processing System
US20110231647A1 (en) * 1995-04-11 2011-09-22 Kientech, Inc. Accessing data in a content-addressable data processing system
US8099420B2 (en) 1995-04-11 2012-01-17 Personalweb Technologies, LLC Accessing data in a data processing system
US20040139097A1 (en) * 1995-04-11 2004-07-15 Kinetech, Inc. Identifying data in a data processing system
US5687366A (en) * 1995-05-05 1997-11-11 Apple Computer, Inc. Crossing locale boundaries to provide services
US5867663A (en) * 1995-07-19 1999-02-02 Fujitsu Network Communications, Inc. Method and system for controlling network service parameters in a cell based communications network
US5889956A (en) * 1995-07-19 1999-03-30 Fujitsu Network Communications, Inc. Hierarchical resource management with maximum allowable allocation boundaries
US5790770A (en) * 1995-07-19 1998-08-04 Fujitsu Network Communications, Inc. Method and apparatus for reducing information loss in a communications network
US5822540A (en) * 1995-07-19 1998-10-13 Fujitsu Network Communications, Inc. Method and apparatus for discarding frames in a communications device
US6426957B1 (en) 1995-07-19 2002-07-30 Fujitsu Network Communications, Inc. Asynchronous transfer mode based service consolidation switch
US5850395A (en) * 1995-07-19 1998-12-15 Fujitsu Network Communications, Inc. Asynchronous transfer mode based service consolidation switch
US5870538A (en) * 1995-07-19 1999-02-09 Fujitsu Network Communications, Inc. Switch fabric controller comparator system and method
US6076112A (en) * 1995-07-19 2000-06-13 Fujitsu Network Communications, Inc. Prioritized access to shared buffers
US6236655B1 (en) 1995-07-19 2001-05-22 Fujitsu Network Communications, Inc. Port and link identification
US5905729A (en) * 1995-07-19 1999-05-18 Fujitsu Network Communications, Inc. Mapping a data cell in a communication switch
US5983260A (en) * 1995-07-19 1999-11-09 Fujitsu Network Communications, Inc. Serial control and data interconnects for coupling an I/O module with a switch fabric in a switch
US5909427A (en) * 1995-07-19 1999-06-01 Fujitsu Network Communications, Inc. Redundant switch system and method of operation
US6256674B1 (en) 1995-07-19 2001-07-03 Fujitsu Network Communications, Inc. Method and apparatus for providing buffer state flow control at the link level in addition to flow control on a per-connection basis
US5948067A (en) * 1995-07-19 1999-09-07 Fujitsu Network Communications, Inc. Converting between an internal cell and multiple standard asynchronous transfer mode cells
US5898671A (en) * 1995-09-14 1999-04-27 Fujitsu Network Communications, Inc. Transmitter controlled flow control for buffer allocation in wide area ATM networks
US6286042B1 (en) * 1995-10-09 2001-09-04 Telefonaktiebolaget Lm Ericsson (Publ) System and method for communications management with redundancy
US5991298A (en) * 1996-01-16 1999-11-23 Fujitsu Network Communications, Inc. Reliable and flexible multicast mechanism for ATM networks
US5813008A (en) * 1996-07-12 1998-09-22 Microsoft Corporation Single instance storage of information
US6067581A (en) * 1998-01-20 2000-05-23 Micron Electronics, Inc. Method for identifying the orignal source device in a transaction request initiated from address translator to memory control module and directly performing the transaction therebetween
US6301645B1 (en) 1998-01-20 2001-10-09 Micron Technology, Inc. System for issuing device requests by proxy
US6081812A (en) * 1998-02-06 2000-06-27 Ncr Corporation Identifying at-risk components in systems with redundant components
US6247077B1 (en) 1998-02-06 2001-06-12 Ncr Corporation Highly-scalable parallel processing computer system architecture
US6421684B1 (en) * 1998-06-12 2002-07-16 Microsoft Corporation Persistent volume mount points
US6711632B1 (en) 1998-08-11 2004-03-23 Ncr Corporation Method and apparatus for write-back caching with minimal interrupts
US8095930B2 (en) 1998-11-24 2012-01-10 Microsoft Corporation System and method for priority-based selection of applications for termination
US20050177832A1 (en) * 1998-11-24 2005-08-11 Microsoft Corporation System and method for terminating applications
US7596563B1 (en) * 1999-10-28 2009-09-29 Hewlett-Packard Development Company, L.P. Computerized file system and method
US7316020B2 (en) 2000-05-02 2008-01-01 Microsoft Corporation Resource manager architecture utilizing a policy manager
US20060136988A1 (en) * 2000-05-02 2006-06-22 Microsoft Corporation Resource Manager Architecture Utilizing a Policy Manager
US7284244B1 (en) 2000-05-02 2007-10-16 Microsoft Corporation Resource manager architecture with dynamic resource allocation among multiple configurations
US8375393B2 (en) 2000-05-02 2013-02-12 Microsoft Corporation Methods and architectures for resource management
US7337446B2 (en) 2000-05-02 2008-02-26 Microsoft Corporation Resource manager architecture
US7844972B2 (en) 2000-05-02 2010-11-30 Microsoft Corporation Resource manager architecture utilizing a policy manager
US7137119B1 (en) 2000-05-02 2006-11-14 Microsoft Corporation Resource manager architecture with resource allocation utilizing priority-based preemption
US7111297B1 (en) * 2000-05-02 2006-09-19 Microsoft Corporation Methods and architectures for resource management
US7451450B2 (en) 2000-05-02 2008-11-11 Microsoft Corporation Resource manager architecture
US20020133526A1 (en) * 2001-03-15 2002-09-19 International Business Machines Corporation Method to control alternative application operation based on results of an ordered application execution attempt
US6829767B2 (en) * 2001-03-15 2004-12-07 International Business Machines Corporation Method to control alternative application operation based on results of an ordered application execution attempt
US7454751B2 (en) * 2001-06-07 2008-11-18 Intel Corporation Fault-tolerant system and methods with trusted message acknowledgement
US7792961B2 (en) 2001-06-07 2010-09-07 Intel Corporation Apparatus and computer-readable media for recoverable workflow
US20080250145A1 (en) * 2001-06-07 2008-10-09 Intel Corporation, Inc. Apparatus and computer-readable media for recoverable workflow
US20020188650A1 (en) * 2001-06-07 2002-12-12 Intel Corporation Fault-tolerant system and methods with trusted message acknowledgement
US7177868B2 (en) 2002-01-02 2007-02-13 International Business Machines Corporation Method, system and program for direct client file access in a data management system
US20030126118A1 (en) * 2002-01-02 2003-07-03 International Business Machines Corporation Method, system and program for direct client file access in a data management system
US8682928B2 (en) 2002-01-02 2014-03-25 International Business Machines Corporation Method, system and program for direct client file access in a data management system
US20070112787A1 (en) * 2002-01-02 2007-05-17 International Business Machines Corporation Method, system and program for direct client file access in a data management system
US7685169B2 (en) * 2002-06-07 2010-03-23 Netapp, Inc. Multiple concurrent active file systems
US7962531B2 (en) * 2002-06-07 2011-06-14 Netapp, Inc. Multiple concurrent active file systems
US6857001B2 (en) * 2002-06-07 2005-02-15 Network Appliance, Inc. Multiple concurrent active file systems
US20030229656A1 (en) * 2002-06-07 2003-12-11 Network Appliance, Inc. Multiple concurrent active file systems
US20100138394A1 (en) * 2002-06-07 2010-06-03 David Hitz Multiple concurrent active file systems
US20050182799A1 (en) * 2002-06-07 2005-08-18 Network Appliance, Inc. Multiple concurrent active file systems
US7587554B2 (en) * 2002-09-26 2009-09-08 Netac Technology Co., Ltd. Device and method for providing data exchange and storage
US20050216624A1 (en) * 2002-09-26 2005-09-29 Guoshun Deng Device and method for providing data exchange and storage
US20040227972A1 (en) * 2003-05-14 2004-11-18 Canon Kabushiki Kaisha Printing apparatus and canceling method
US8270001B2 (en) * 2003-05-14 2012-09-18 Canon Kabushiki Kaisha Printing apparatus and canceling method
US8626793B2 (en) * 2004-03-02 2014-01-07 Intel Corporation Object storage
US20100145995A1 (en) * 2004-03-02 2010-06-10 Cameron Donald F Object storage
US20050223223A1 (en) * 2004-04-01 2005-10-06 Fujitsu Limited Authentication apparatus and authentication method
US20070220116A1 (en) * 2006-03-14 2007-09-20 Anthony Rose Filter for a Distributed Network
US8185576B2 (en) 2006-03-14 2012-05-22 Altnet, Inc. Filter for a distributed network
US8775508B2 (en) 2006-03-14 2014-07-08 Altnet, Inc. Filter for a distributed network
US9098683B2 (en) 2006-03-14 2015-08-04 Global File Systems Holdings, Llc Filter for a distributed network
US9798567B2 (en) 2014-11-25 2017-10-24 The Research Foundation For The State University Of New York Multi-hypervisor virtual machines
US10437627B2 (en) 2014-11-25 2019-10-08 The Research Foundation For The State University Of New York Multi-hypervisor virtual machines
US11003485B2 (en) 2014-11-25 2021-05-11 The Research Foundation for the State University Multi-hypervisor virtual machines
US11809891B2 (en) 2018-06-01 2023-11-07 The Research Foundation For The State University Of New York Multi-hypervisor virtual machines that run on multiple co-located hypervisors
EP3798859A1 (en) * 2019-09-26 2021-03-31 Citrix Systems Inc. File system using approximate membership filters

Similar Documents

Publication Publication Date Title
US5014192A (en) System for locating a file in a logical ring by sequentially forwarding access request with file system name and file name
US4835685A (en) Virtual single machine with message-like hardware interrupts and processor exceptions
US4694396A (en) Method of inter-process communication in a distributed data processing system
US4914583A (en) Method of indicating processes resident within a cell of a data processing system
US5047925A (en) Logical ring in a virtual single machine
US4754395A (en) Network interface module with minimized data paths
EP0274406B1 (en) Self-configuration of nodes in a distributed message-based operating system
US5502839A (en) Object-oriented software architecture supporting input/output device independence
US5335323A (en) Computer human interface with multiapplication display
US5062060A (en) Computer human interface comprising user-adjustable window for displaying or printing information
US5060150A (en) Process creation and termination monitors for use in a distributed message-based operating system
JP2779587B2 (en) Apparatus and method for making part of a namespace used for a computer system available as part of another namespace
US6314460B1 (en) Method and apparatus for analyzing a storage network based on incomplete information from multiple respective controllers
US5623666A (en) Distributed computing system
US5301270A (en) Computer-assisted software engineering system for cooperative processing environments
EP0501610A2 (en) Object oriented distributed computing system
WO2009039072A2 (en) System for development and hosting of network applications
US5875322A (en) Making a control available to a computer without installing the control
EP0201063B1 (en) Method of locating processes in a distributed data processing system
US6324563B1 (en) Customer information control system application programming interface, with global and local system and file control functions, in a loosely coupled data processing environment
Tripathi An overview of the Nexus distributed operating system design
EP0201065A2 (en) Virtual single machine with logical ring and with message-like hardware interrupts and processor exceptions
EP0201064B1 (en) Computer system with data residency transparency and data access transparency
CN108008983B (en) Multi-interface data processing method based on single process
EP0274413B1 (en) Process traps in a distributed message-based system

Legal Events

Date Code Title Description
AS Assignment

Owner name: MOTOROLA INC., 2900 SOUTH DIABLO WAY, TEMPE, AZ A

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST.;ASSIGNOR:MOTOROLA COMPUTER X, INC.;REEL/FRAME:005535/0346

Effective date: 19901023

FEPP Fee payment procedure

Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

FPAY Fee payment

Year of fee payment: 4

REMI Maintenance fee reminder mailed
LAPS Lapse for failure to pay maintenance fees
FP Lapsed due to failure to pay maintenance fee

Effective date: 19990507

STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362